Do you think you have what it takes to play with the best?
Via Resource are throwing down the gauntlet and running a global challenge to see who is the very best in the world at finding and detecting vulnerabilities.
The Vulnerability Research Challenge is open to all Hackers & InfoSec pros who want to test their skills and see how they rank against the global competition.
[wp_ad_camp_4]
Humans make mistakes. This is something that we all know and appreciate. Some mistakes are easy to spot and others are much harder, finding vulnerabilities is one of the most challenging things you can do and you never know when, or if you have finished. All you know is you have reached your level of capability and run out of ideas!
On any given day numerous vulnerabilities are available from exploit providers. Many of these exploits normally go unknown to the affected software vendor and its users for long periods of time (on average 151 days).
“For societies progression we need to improve this, if we do not raise awareness and improve on our skills shortage in this area we are always going to be leaving our windows open for Cyber Thieves,” said Tor Macleod, Director at Via Resource, “Top Talent in the Industry has no price tag, with some Vulnerabilities being sold to software companies for million dollar + figures.”
About the Vulnerability Research Challenge
The test has been designed for us by some of the worlds leading experts in vulnerability management.
All entrants will be sent the file on the same date. The file “server” is an ELF 32-bit stripped executable build on Ubuntu Linux 12.10 using shared libraries.
They will then have 1 week to find as many vulnerabilities as possible. Points will be awarded for the number of vulnerabilities found, quality of PoCs and the time spent. There will be some easy ones and some pretty tough ones so be prepared for a challenge!
Competition Details & Registration
www.viareosource.com/VRC2014
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.