Announcement

Collapse
No announcement yet.

Exploit Hackathon 2.0 [2013]

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Exploit Hackathon 2.0 [2013]

    [ RESERVED ]
    One man can change the world.
    ------------------------------------------
    "Hello everybody out there using minix -
    I'm doing a (free) operating system ..."
    - Linus Benedict Torvalds -

  • #2
    Re: Exploit Hackathon 2.0 [2013]

    [ RESERVED ]
    One man can change the world.
    ------------------------------------------
    "Hello everybody out there using minix -
    I'm doing a (free) operating system ..."
    - Linus Benedict Torvalds -

    Comment


    • #3
      Re: Exploit Hackathon 2.0 [2013]

      [ RESERVED ]
      One man can change the world.
      ------------------------------------------
      "Hello everybody out there using minix -
      I'm doing a (free) operating system ..."
      - Linus Benedict Torvalds -

      Comment


      • #4
        Re: Exploit Hackathon 2.0 [2013]

        Apparently moderation is broken so posting this and will fix it later:
        =======================

        For too long we have suffered in silence while rude multitudes have screamed on our screens.
        It is time to take action, to heed the call and end the suffering of a misbegotten tool too easily abused by the masses.
        In short, it is time we declared WAR on the CapsLock button.

        For the next 72 hours it is you who will make the difference in the battle of the noise.

        Your objective:
        To make a single decisive strike and render the capslock key useless.
        You may disable, redirect, reutilize or otherwise fsck this button into oblivion.

        You must:
        Document your plan of attack
        Code a virus (utility) to do your dirty work
        Demonstrate a working copy of your construct
        Provide both the working utility and a cleanup tool (just in case)
        Submit your Code.

        To win:
        Be creative.
        The better and more useful your utility
        Be aggressive.
        You should have a plan to self propagate your "tool"
        [A 0-day here will get you considered but will not guarantee a win]

        Have Fun.
        The more interesting, useful, entertaining, wacky your utility is,
        the more you put into it, the more likely it is to be noticed.
        One man can change the world.
        ------------------------------------------
        "Hello everybody out there using minix -
        I'm doing a (free) operating system ..."
        - Linus Benedict Torvalds -

        Comment


        • #5
          Re: Exploit Hackathon 2.0 [2013]

          Exploit Hackathon will return this year and the rules have changed. We will require teams to use code to change the function of a cool piece of hardware. Teams competing for the prize should be prepared to force their modification onto the hardware supplied.

          Exploit hackathon entries will be judged by notable infosec figures who must be impressed to decide a winner. Last year no one was able to claim the prize, this year will it be you?



          Exploit Hackathon (the “Contest”) is a skill contest where participants must develop a solution (“Solution”) to the challenges presented for this contest. The Solution that you develop will be evaluated by judges, who will choose the winner(s) in accordance with these Official Rules. The prize(s) will be awarded to participant(s) with the highest score for the judging criteria. See below for the complete details.

          THE AGREEMENT: In order to enter the Contest, you must agree to these Official Rules (“Rules”). Therefore, please read these Rules prior to entry to ensure you understand and agree. You agree that submission of an entry in the Contest constitutes agreement to these Rules. You may not submit an entry to the Contest and are not eligible to receive the prizes described in these Rules unless you agree to these Rules. These Rules form a binding legal agreement between you and Exploit Hackathon with respect to the Contest.

          CONTEST PERIOD: The Contest begins at 12:00:00 A.M. Pacific Time (PT) Zone in the United States on 8/2/2013 and ends at 6:00:00 P.M. PT on 08/3/2013 (“Contest Period”). ENTRANTS ARE RESPONSIBLE FOR DETERMINING THE CORRESPONDING TIME ZONE IN THEIR RESPECTIVE JURISDICTIONS.

          Team Size - Teams of up to 5 humans are allowed.
          What to Build - Create a prototype of a solution to the problem proposed that solves the complaint expressed.
          Scope - solution must run in the environment provided.


          HOW TO ENTER: NO PURCHASE NECESSARY TO ENTER OR WIN. To enter the Contest, visit the Defcon Forums website located at https://forum.defcon.org/forumdisplay.php?f=738 (“Contest Site”) during the Contest Period and submit your hackathon entry via the linked submission form. All Entries will be released under an open source BSD 3 Clause license approved by the Open Source Initiative (http://www.opensource.org/licenses/index.html) and uploaded to a public code hosting platform (e.g. GitHub, Google Code) and submitted via the submission form (hereinafter, “Requirements”). Written parts of entries must be in English to be eligible. The Solution must, at a minimum, support English language use. The Submission must include a link to the Solution, whether it be a mobile or web app, website, or platform, and a short text description of the proposed Solution. Any branding included on a submission should be created by the individual/team who worked on it.



          JUDGING: Each entry will be judged by a panel of experts (“Judges”). On or about 07/4/2012, each Solution will be evaluated by the Judges based on the following criteria :


          The objective:
          To make a single decisive strike and render the capslock key useless.
          You may disable, redirect, reutilize or otherwise fsck this button into oblivion.

          You must:
          Demonstrate a working copy of your Solution
          Provide both the working utility and a cleanup tool (just in case)
          Submit your Code.

          Creativity.
          Usefulness
          Uniqueness
          Entertainment Value
          Distribution Mechanism


          Judges will evaluate each submission based on the above-listed criteria and will determine one winner /Team for the prize(s). In the event a potential winner is disqualified for any reason, the Solution that received the next highest total score will be chosen as the potential winner.



          7. PRIZES:

          Exploit Hackathon Has AWESOME PRIZES! (If you can win them)
          The winner of Exploit Hackathon (If one is declared) will receive two (2) Microsoft Surface RT Tablets generously donated by Microsoft.
          Last Years PwnPlug was donated to be auctioned for Hackers for Charity after no winner was declared.

          ADDITIONAL PRIZE ELIGIBILITY: Due to the nature of the code generated during the contest, your solution may be eligible for entry into other InfoSec Awards and promotions. Exploit Hackathon permits and encourages your pursuit of these awards and waives all claims for these. Mentioning our contest however would be greatly appreciated and is encouraged.


          INTELLECTUAL PROPERTY RIGHTS:
          By submitting a Solution in this Contest, the entrant warrants and represents that the Solution, including the programming and related material, is open source and is released subject to the Open Source Initiative approved licenses (http://www.opensource.org/licenses/index.html) selected for this event and not subject to the proprietary rights of any person or entity.

          RESPONSIBLE DISCLOSURE: Code release may be detained for a reasonable period to allow for the responsible disclosure of any security flaws discovered during the Contest. It is not the intent or purpose of Exploit Hackathon to release a 0-Day into the wild.

          PRIVACY: Participants agree that personal data entered during the registration, including name, mailing address, phone number, and email address may be processed, stored, shared and otherwise used for the purposes and within the context of the Contest. This data will also be transferred into the United States. By entering, entrants agree to the transmission, processing, sharing and storage of this personal data in the United States.

          By accepting a prize, participant agrees and consents to Exploit HAckathon and its agents use of entrant’s name and/or likeness to name the entrant for a reasonable time after completion of the Contest in promotional material as a winner of the Contest without additional compensation, unless prohibited by law.


          PUBLICITY. By accepting a prize, entrant agrees Exploit Hackathon and its agencies use of his or her name and/or likeness and the Solution for promotional purposes without additional compensation, unless prohibited by law.


          ELIMINATION: Any false information provided within the context of the Contest by any entrant concerning identity, mailing address, telephone number, email address, ownership of right or non-compliance with these Rules or the like may result in the immediate elimination of the entrant from the Contest.


          INTERNET: Contest Entities are not responsible for any malfunction of the entire Contest Site or any late, lost, damaged, misdirected, incomplete, illegible, undeliverable, or destroyed submissions or entry materials due to system errors, failed, incomplete or garbled computer or other telecommunication transmission malfunctions, hardware or software failures of any kind, lost or unavailable network connections, typographical or system/human errors and failures, technical malfunction(s) of any telephone network or lines, cable connections, satellite transmissions, servers or providers, or computer equipment, traffic congestion on the Internet or at the Contest Site, or any combination thereof, including other telecommunication, cable, digital or satellite malfunctions which may limit an entrant’s ability to participate.


          RIGHT TO CANCEL, MODIFY OR DISQUALIFY. If for any reason the Contest is not capable of running as planned, including infection by computer virus, bugs, tampering, unauthorized intervention, fraud, technical failures, or any other causes which corrupt or affect the administration, security, fairness, integrity, or proper conduct of the Contest, Exploit Hackathon reserves the right at its sole discretion to cancel, terminate, modify or suspend the Contest. Exploit Hackathon further reserves the right to disqualify any entrant who tampers with the submission process or any other part of the Contest or Contest Site.
          One man can change the world.
          ------------------------------------------
          "Hello everybody out there using minix -
          I'm doing a (free) operating system ..."
          - Linus Benedict Torvalds -

          Comment

          Working...
          X