what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

hacker.challenge.html

hacker.challenge.html
Posted Aug 17, 1999

The Hacker Challenge (qubik)

tags | paper
SHA-256 | 01e62aa755b70416fc189669619e9dc6ea2667e1d85012dae2c5015461f2edf7

hacker.challenge.html

Change Mirror Download
<HTML>
<HEAD><TITLE>Hacker Scene</TITLE>
</HEAD>
<BODY BGCOLOR="#000000" TEXT="#FFFFFF" LINK="#FF0000" VLINK="#C0C0C0" ALINK="#FF0000">

<pre>


The Hacker Challenge

By: Qubik (qubik@bikkel.com)

You have probably read about them and some of you may have even participated in one or two. Hacker
challenges; where your asked to bypass the latest security measure implemented into technology which
is already, prior to testing, dubbed as the latest in computer protection. But for what in return?
Most challenges offer a reward of some sorts, a reward which is more often than not, a five or six
figure with a dollar sign placed neatly at the beginning.

So just what is the deal with these challenges? What purpose do they really serve and are they just
marketing ploys?

I'd like you to imagine for a moment that you're an administrator of a small corporate network. It's
not the most exciting of jobs, and you don't have time to keep up with the latest going ons in the
security scene. Your network has been attacked a few times before, and you start to think about
upgrading your security. So where do you start?

Where else would you start, but the internet? It's the worlds largest resource, and every good
company dealing with network security, is bound to be on the internet somewhere. So you use a search
engine or two and you come across a web site for a new state of the art firewall, who's
manufacturers claim it resisted every hacker that attempted to hack it at a recent hacker
convention. Your amazed, surely their high price tag is nothing for complete security!?

Only what if it is all a clever ploy, haven't you got to ask yourself just how many people actually
tried to hack into that particular piece of software? Haven't you got to look into the reputation of
the manufacturer? Of course you do! To be sure, you've got to ask for the cold hard facts, not the
marketing babble!

There are serious flaws in many hacker challenges, not the least being that most 'real' hackers only
hear about them after they've finished. This makes you wonder just who took part, and how they found
out about it.

It's not uncommon for hackers and security analysts to earn wages in excess of six figures, and to
earn such wages, you've got to be either very lucky, or very busy. So what's your guarantee that a
hacker who actually knows what he is doing, actually took the time out to earn a, comparatively,
small ten thousand? You have no guarantee at all, why on earth should he or she bother?

Next ask yourself whether real hackers would want to find all those bugs in that new technological
innovation. Surely their only going to end up making their job, of hacking, harder by pointing them
out?

However, A low level source code analysis of a piece of software or a close look at hardware by
reputable third party security analysis company will delay product ship times and cost a lot more
than setting up a hacker challenge. Not to mention that it has nowhere near the same marketing
punch. Display your product at an upcoming convention and let people bang on it for a weekend and
then claim "Product X survives Hacker Challenge." Makes a great press release.

It all seems rather corrupt, with companies hiding the truth and rubbing their hands at the millions
they make. A ten thousand dollar reward seems rather pathetic, when your earning ten times that kind
of money. Surely these companies know this, are they in fact attempting to social engineer the
hackers or maybe worse their customers?

But it's not all like that, there are plenty of genuine challenges out there. Some have been set up
to test software and, now more and more, hardware, others testing entire networks. For example,
recently the Quebec government is enlisting the aid of hackers to test its networks and to research
new ways of protecting those networks.

So what can we say about hacker challenges? Do they really prove how secure a product is? I don't
think so, the fact that most aren't officially announced to the hacker public and that they are
often deliberately misinterpret, doesn't give a good impression. But then, who should a company go
to? It's not the easiest of tasks in the world, to announce such a challenge.

Hack at your own discretion, don't be afraid to take part in a hacker challenge, but don't take the
word of the manufacturer, when they say it's secure, just because a few passers by a convention
typed a few keys on a keyboard. There will always be flaws in hardware and software, it's up to us
to the true hacker to find and fix them, whether we do it for the companies maketing campaign, or
for personal gratification.

</pre>
</body>
</html>


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close