So I liked the banking / card merchant scenario I'd been working on. I have a tarball sitting around right now with 120,000 fake names and CCNs waiting to be put to good use.
But.... When the most interested parties on the forums are telling me it's horked I can take a hint.
Since last year much of what we came up with came from input here, I'm going to circle back at this point and ask for the same thing this time around. Believe it or not, we are actually way ahead of where we were last year!
So... What are you wanting to see in terms of a defender contest at DefCon?
You have the following constraints to operate under:
So, whether you're a defender, an attacker, or just someone with too many opinions, what would you do?
But.... When the most interested parties on the forums are telling me it's horked I can take a hint.
Since last year much of what we came up with came from input here, I'm going to circle back at this point and ask for the same thing this time around. Believe it or not, we are actually way ahead of where we were last year!
So... What are you wanting to see in terms of a defender contest at DefCon?
You have the following constraints to operate under:
- Somehow, entries have to have a real attack surface and attackers have to have a fighting chance.
- Compromise has to be empirically measurable.
- IPV4, 10/100 ethernet. 48 port switch. Attackers will not be on the same layer 2 LAN.
- A dedicated and highly motivated base of attackers, for reasons that I'm going to keep hush-hush for a bit.

- Ideally, the stakes should go up progressively.
So, whether you're a defender, an attacker, or just someone with too many opinions, what would you do?
Comment