Originally posted by TheCotMan
From that challenge site it says
"This is just an opportunity to pursue your passion. So there is no prize; just applause. And your name will be on our Challenge page forever!"
(cuz most hackers are motivated by fame... right)
I hope there's a good writeup on what was attacked, what was secured and all... In this situation of course. Plenty of info on how to secure a system can be found, but a incident analsys step by step, defense vs attack and etc would still be a good read.
Comment