Get Paid To Crack? 226
John Klein writes "Corporate Technologies USA, Inc. is offering hackers $250US and up as part of the Hacker Wargame Research Project. Participants are given sufficient time to hack three primary goals on real Windows 2000 servers on an internet connected wargame network. The servers are updated with fairly current Windows patches, so this is not necessarily an easy task. The difficulty is part of the point. The Project is studying how hackers think, called cognitive research, in an effort to better understand how future IDSs might identify the target of an attack during it's early stages. The Project guarantees complete anonymity for those that want to participate without pay, or complete privacy protection to those that choose to get paid."
Like Most Other Hacking Competitions (Score:5, Funny)
Re:Like Most Other Hacking Competitions (Score:1, Informative)
They have a firewall in which they will allow only one IP address at a time to make the attempt. Thus, you sign up for a set time period and they watch you as you hack away...
Re:Like Most Other Hacking Competitions (Score:5, Funny)
Sorry son, a firewall won't help when your network connection(s) are saturated.
Maybe I didn't RTFA, but you didn't RTFM.
Re:Like Most Other Hacking Competitions (Score:2)
This won't work realistically. (Score:5, Insightful)
Interesting. Seeing as many security tripwire programs shut out an IP as soon as they get suspicious, I can't see how this would replicate a realistic programming environment. One of a cracker's most important tools is being able to attack from unexpected (spoofed or rerouted) IPs. To come from every direction, as it were.
This reminds me of a similar study on Unix use I was in, that studied how people navigate a directory tree in a Unix shell and find relevant files and information quickly. The catch? No pipes or multi-command lines. But pipes are how a knowledgeable Unix user does things - the system is built up around it. So basically, the artificial limitations of the study cripple the performance of the participants.
Re:Like Most Other Hacking Competitions (Score:4, Funny)
Apparently I haven't had enough coffee yet, at first glance I thought that said get paid to smoke crack.
If many others read it that way, I see a meltdown on their server within moments.
Re:Like Most Other Hacking Competitions (Score:1, Funny)
Feh, people do that in the streets every day (Score:2)
Nah... (Score:1, Funny)
The first hit is free... (Score:1)
Re:The first hit is free... (Score:4, Funny)
I saw "Get Paid to Crack" and thought it was "Get paid for Crack"
paid for crack. really. *click*
Secret Methods ?? (Score:2, Interesting)
Re:Secret Methods ?? (Score:2, Informative)
No real hacker worth is salt, would enter a "hacking competition" for 250$. I know a few who wouldnt enter for 10000$. For them, their livelihood depends on how their skills are able to penetrate into a corporation (yes, they hack for a living).
And about this new windows box: All I'll say is there's a nasty exploit that can get me a SYSTEM priv shell remotely. And it's worked on every box that I've tried it upon.
Re:Secret Methods ?? (Score:2)
And about this new windows box: All I'll say is there's a nasty exploit that can get me a SYSTEM priv shell remotely. And it's worked on every box that I've tried it upon.
Hello? Full disclosure anybody?
Are all of the Windows admins here supposed to just freak out? What program does it exploit?
Re:Secret Methods ?? (Score:2)
isn't $250 kinda cheap? (Score:5, Insightful)
It's actually a lot of money! (Score:2)
We'll give you 0.01%. We keep 99.99%. (Score:2)
To me, the "competition" seems to say, "We've been given $2,500,000 by Microsoft to find security vulnerabilities in Windows. Give us $25,000 worth of information about how to improve Windows and we will give you $250."
Okay, here is my contribution: Unpatched IE security holes [pivx.com] -- 11 September 2003: There are currently 31 unpatched vulnerabilities. Okay, where's my money?
The usual reason someone becomes a destructive hacker is that he or she feels abused by adults. Isn't this more abuse?
Re:isn't $250 kinda cheap? (Score:2)
Because a Top 5 competition doesn't seem to be what they're looking for. They aren't studying Windows security, they're studying hacker methodology, and depending on what exactly they're looking for quantity may be more relevant to them than quality.
Re:isn't $250 kinda cheap? (Score:2)
"Corporate Technologies USA, Inc. is offering hackers $250US and up [...]
Keywords : '$250US and up'
Wargame Servers (Score:5, Interesting)
Where is the poor tech support agent that I call to inform of the "new authentication procedures"? Where are the client boxes sending out cleartext FTP passwords over a compromised proxy server?
Seriously, this isn't a great way to study "cracker patterns". Most crackers aren't creative enough to gain access to a box that lacks the common weaknesses of a corporate server. It's easy to setup a server that no one is supposed to use, but the challenges (and weaknesses) come from the balance between security and usability.
Re:Wargame Servers (Score:2, Insightful)
Re:Wargame Servers (Score:2, Interesting)
Re:Wargame Servers (Score:3, Interesting)
Obligatory Movie Quote (Score:2, Funny)
Greetings, Professor Falken (Score:2)
Shouldn't be too hard (Score:2, Insightful)
1. Wait for critical security patch from Microsoft (shouldn't take long)
2. Read up on exploit
3. ???
4. Get paid
Re:Shouldn't be too hard (Score:2)
What about the DMCA? (Score:2, Interesting)
Re:What about the DMCA? (Score:2)
IDS (Score:3, Interesting)
I wonder how far they are willing to go to protect a hacker that finds a rare vulnerability.
Re:IDS (Score:2, Interesting)
Collect my IP an MAC address, you still won't find my identity!
I'm using old fashioned accoustic modem in a public telephne box, with an call-by-call provider.
Or, maybe I'am sitting in a car with a laptop and connect through an unsafely set up WLAN from "Joe Doe dentist".
You are obviously not a hacker, since you don't understand that IP and MAC-addresses are no trail to a hackers identity!
It is just too simple to disconnect your identity from the IP and MAC-addresses.
Unless you want to earn some money wi
Dont trust this guy.... (Score:1, Interesting)
Note the term Hacker in all the writeups, the incorrect use term the establishment uses to paint Linux hackers black ? Note the referral program ? Trust nobody!!
On a serious note, suppose somebody actually cracks their server, and they hold the information secret, will they be an accesory to crime ? Surely enough , just because nobody compained about a murder
I trust them implicitly (Score:5, Funny)
Q4: How do I know you aren't working for the man?
A: We're not, we promise.
Re:I trust them implicitly (Score:2)
A: We're not, we promise.
Q5: HA! Thats exactly what I'd expect the man to say!
A: Hey, thats not a question..
Re:Dont trust this guy.... (Score:2)
You answered your own question: that third party will never win the lawsuit, although his heirs might...
Because it's not illegal if you have permission (Score:5, Insightful)
Same goes for computer access. You are perfectly legal in hacking a system PROVIDED you have permission. If it belongs to you or if the rightful owner has gtiven you permisson, go nuts. It is only a crime when you do it without permission.
Well, they are explicitly giving you permissoin to hack their boxes if you want to play their game. Thus, no problem. Given the publicised nature of this, even if they decided to try and perjur themselves later and claim you did it without permission, it would be easy to prove otherwise (then they'd go to jail for falesly accusing you of a crime).
Re:Because it's not illegal if you have permission (Score:2)
Re:Because it's not illegal if you have permission (Score:2)
What they COULD do is if you published something about the venurability you used, they could go after you for that. It would probably get thrown out of court (would likely be a civil case), but they could try all the same.
Ho
Re:Because it's not illegal if you have permission (Score:2)
It's illegal if They say it's illegal (Score:2, Interesting)
Tell that to Randal Schwartz [stonehenge.com]. Because he did not obtain permission for each individual action, he was convicted of Computer Crime [lightlink.com]. You can email his perl bot [mailto] for more info.
Beware people with benevolent intentions, as they usually become malevolent when they realize 1)
Re:Because it's not illegal if you have permission (Score:2)
So, the man with a broken rib takes his savior out to lunch and then sues him (successfully, I might add) for tens of thousands of dollars, since anyone recieving COMPENSATION (even a burger and fries) for medical services is liable for incidental injuries if it can be proved they have insuf
Re:Dont trust this guy.... (Score:2)
I don't think you understand computer crime. The person who owns the computers is providing authorization for other people to gain access to them. Just because the computer isn't letting them in without being tricked does not in any way change the fact that they still have
Re:Dont trust this guy.... (Score:3, Insightful)
Re:Dont trust this guy.... (Score:2)
Oh, give it up. The usage war is over, and you lost before it even started. ESR can whine all he wantsa, but a person who breaks into computers is a "hacker". That isn't the only meaning the word has, but it's the most common one. "Cracker" already has meaning and connotation when applied to a person, and it has nothing to do with computers! Are to trying to suggest that only poor southern
Wanted (Score:2, Funny)
Re:Wanted (Score:2)
Mitnick Trick? (Score:3, Interesting)
I, for one, would be seriously surprised if anyone at Microsoft uses this to build a better system. I could see if this research was used for security outfits to track B&Es, but even that's a little loosey-goosey, IMHO.
This effort could be for the good, but crackers out there be warned that this could be a one stop ticket to FBI surveilance and eventual lockup. Come now, doesn't this remind you of the RIAA's amnesty offer?
Re:Mitnick Trick? (Score:2)
I'd be really surprised too, because in the FAQ [hackerwargame.org] they say that they'd rather M$ fix the problems before releasing software so they wouldn't have to do this sort of thing.
Come now, doesn't this remind you of the RIAA's amnesty offer?
Nope. This seems legit to me. If you're good en
Sure, Just dont be TOO good (Score:2, Insightful)
I need sleep (Score:2, Funny)
Where where?
Sigh.
Right here! (Score:2)
Re:I need sleep (Score:2)
> When I first read the title, I thought it was "Get Paid For Crack?"
>
>Where where?
On a streetcorner near you, now!!
Re:I need sleep (Score:2)
"White powder in the mail... really "
I thought the same (Score:2, Interesting)
Made my day! (Score:3, Funny)
"The servers are updated with fairly current Windows patches, so this is not necessarily an easy task."
hahahahahah
Sure, fun, but (Score:1)
I think I'll work at Wendy's for the week... more profit!
Oh? (Score:1)
Will that still be the case when someone hacks in to their system housing the database of participant names?
Not a lot of confidence... (Score:4, Informative)
From their FAQ: [hackerwargame.org]
You should be able to complete the goals easily without the need to break any laws...[in] about 5 hours
Sounds like this is more of a "target-rich environment" where they expect the dedicated hacker to succeed, and they want to study means/methods, rather than a "our box is unbreakable" type challenge. I think they'll be writing a lot of $250 checks--which explains also why the sum is low.
So they have to take down a Windows server... (Score:1, Funny)
Good God, that's insulting. (Score:2, Informative)
Corporate Technologies USA, Inc. is offering hackers $250US and up as part
In the real world, a "consultant" would be charging $250 AN HOUR, at a bare minimum.
Wake up and smell the coffee, dudes. They're using you as slave labor.
Re:Good God, that's insulting. (Score:2)
Re:Good God, that's insulting. (Score:2)
- Chris
(Yeah yeah I know, it's a joke..)
Re:Good God, that's insulting. (Score:2)
>>Corporate Technologies USA, Inc. is offering hackers $250US and up
>>as part
>
>In the real world, a "consultant" would be charging $250 AN HOUR, at
>a bare minimum.
>
>Wake up and smell the coffee, dudes. They're using you as slave
>labor.
You've got to be dreaming. I'm a professional pen-tester and my chargeout rate is about a grand a day (sterling), er, about $1500 a day. I take home about 1750 (sterling) a month, er, approx. $140/day.
How do you guarantee anonymity? (Score:3, Insightful)
Complete anonymity? An interesting idea. Let's talk about the practical ways you could "guarantee" somebody else's anonymity on the internet while still having the contest? I tried to make a list, but all I came up with pretty much amounted to "Dump all the logs." Which obviously makes it really difficult to study the attack patterns.
Obviously, the best way to remain anonymous is not to break into other people's networks, invited or otherwise. I mean, are they really going to destroy their data if the FBI calls? That would definitely be illegal (and unwise in our current "terrorism-freak-out") and publicly pre-meditated, at that.
If I had the kind of skillset these people are obviously recruiting for, I would be extremely leery of participating in this "competition." But I don't, and would have no interest.
"Lenny! Tell Mr. Burns I went home to work on the contest!"
Re:How do you guarantee anonymity? (Score:3, Interesting)
My cousing works at the FBI and tried to recruit me for that. I was interested until I took the pre-qualification test wizard on their web-page. It asks three questions, the last of which was "Have you smoked marijuana more than three times in your life?"
So I was pretty much out. But frankly, that is the government's loss.
Re:How do you guarantee anonymity? (Score:2)
Why does the government care? Because marijuana has been arbitrarily deemed immoral by lawmakers? Why not the questions "Have you consumed more than three beers in your life?" "Have you smoked more than three tobacco cigarettes in your life?" "Have you looked at a woman who isn't your wife more than three times in your life?" "Did you speed while passing another vehicle more than three times in your life?"
"Corporate Technologies USA, Inc."? (Score:2)
Even if I'm wrong about the government or marketing, I am certian that there are fancy pants involved.
Re:"Corporate Technologies USA, Inc."? (Score:2)
Just like the hacking conventions sponsored by the Flower Bringer Industry
Comment removed (Score:4, Funny)
Re:Don't do it. (Score:2)
Re:Don't do it. (Score:2)
This should be easy! (Score:2)
The servers are updated with fairly current Windows patches
Oh.. darn. I guess I just have to do it the easier way and send the administrators an email masquerading as a windows update.
bah too easy (Score:2)
At least you know you have a chance to win with this platform. That might also explain why the prize is only 250 bucks, it might have be a lot more if participants were to hack a netbsd box for example.
Oh well, in any case, wargame research projects that don't involve a WOPR are just not worth the name I say
Well let's see (Score:2, Insightful)
Future Build Weaknesses (Score:5, Insightful)
And they think that this will reveal how hackers think.
So, what we end up with is a bunch of people getting paid a little bit of money to mess with statistics. How many are going to use obvious techniques, just to skew the results in a 'nobody thought of this so it must be safe from exploit' way?? How many are going to have a grand time hacking into their real system just for fun?
And for that matter, how many dumb wanna-bes are going to end up sharing their IP address with a company that might just duly record them, along with the name that they're writing the check out to, and hand it over to other investigators, saying, "Hey- these are the hackers who applied"?
I'm guessing that anyone who's willing to take the money but isn't up to a level where they can really accomplish anything is going to eventually get caught playing with someone else's network- i don't pay enough attention to hackers in the news, so i'm not up to speed on whether this constitutes admission of previous (potentially criminal) activity or not... but if the company has a list of people who registered to 'contribute,' to the effort, they could then give the list to anyone, right?
Somehow, the only way that this could look funnier to me is if they had to enter the system, install kazaalite, upload copyrighted music files to it, and make them available for download. At which point the RIAA would step in and prosecute, creating a net loss of approximately $14,750.00USD for the hacker.
Scenario two is the same, but they have to upload Gigli, and set it to play in a continuous loop until the machine explodes in a desperate move of self-preservation. (And the MPAA would be prosecuting.)
That is... if the hacker were dumb enough to give their real name and use their own (and static) IP address....
$250, you are shitting me, right? (Score:2, Funny)
this won't work (Score:2)
both of those aren't an option here on a box that isn't used by anyone, just sitting there.
Another option (Score:2)
Too late to join (Score:3, Informative)
Q23: I'm too busy to do this right now, but I'd like to do it later. How long is this study going on?
A: We anticipate the study to be wrapping up at the end of 2003, but we will probably be done recruiting by mid-year at the latest, so don't wait too long. Sorry, no reservations accepted.
I'll go digging at archive.org now to find out how long they've been up.
I read the title... (Score:2)
Windows HoneyPot? (Score:2, Insightful)
-- M
Our research... (Score:2, Interesting)
Our biggest problem has been getting crackers to participate. Most are so skeptical and wary that they are reluctant to take the survey (which we designed specifically so respondents don't have to admit to doing anything illegal).
Ou
These ppl are looking for someone to hire.... (Score:4, Interesting)
1. We will contact you by e-mail within 72 hours to let you know that we have received your application. This is not an automated mailing, it is a real response from a human being.
2. We will review your application within one week of application and decide if we will invite you to participate. You will again be personally notified, this time by e-mail or telephone, of our decision.
3. If you are not chosen to participate, we will tell you why, and we will destroy all records of your application and our communications with you. The only information we will keep is a paper list of who applied and was rejected, and why.
4. If you are chosen to participate, you will be sent more info on the wargame research project.
5. You will need to prepare yourself by following the instructions, and schedule a time with us to complete your hack. We will send you all of our direct contact information so you can talk to us directly to answer any questions that you might have.
6. If you intend to use any Windows box(es) during your hack, you will need to download the free demo version of the CamTasia screen recorder program (15.4MB) from our FTP server [ anonymous login to ftp.hackerwargame.org ] or from the author's commercial website if you prefer. Install the program ahead of time, and play with it a bit to ensure that you know how to use it. It's very simple, and the defaults will work, but you can optimize your output and file size by turning off hardware acceleration and setting your desktop resolution to 800x600 at 16bpp color. We don't recommend recording at 24-bit or 32-bit color since this will result in very large files in the Gig range rather than a few MB.
7. If you intend to use any *nix box(es) during your hack, you will need to start off by running the command "script -a
8. If you intend to use a Apple/Mac during your hacks, you're kind of on your own regarding how you're going to produce logs for us, but Snaps Pro X works well under OS-X, and a plain text file with a LOT of typing might work.
9. Prior to the hack, you will need to get your computer(s) ready for the hack. This includes downloading any tools you intend to use, checking your internet connectivity, and letting us know what IP address(es) you will be coming from. If you receive dynamic address(es) you can notify us of your address just before the actual hack time. To make it easier, you can also get a free account with a free dynamic IP tracking service like NO-IP.com (or any other that you prefer) which will give you a domain name that tracks your dynamic IP address, which we can use to set you up in our IP filter.
10. At your arranged date and time, you will need to synchronize all of your computer's times to our network so that we can match up logs. We will give you a webpage where you can do this easily, or you can use any standard NTP utility since our network is synchronized at Stratum 2 to the US Atomic Clock. You will then begin your hack by sending us an e-mail to a specific address telling us that you are starting. You will be notified of the wargame's IP address prior to your scheduled hack time.
11. During the hack, you will log which goal you are attempting to accomplish. This can be done quite simply by typing, for example:
10:21:42.15>echo SQL goal
SQL goal
10:21:42.15>
in a DOS box or on the *nix console. Note that your command prompt needs to show the time so we can synchronize our logs. On *nix this is done by setting PS1=$t> and on Windows boxes by typing prompt $T$G
It will also be helpful if you kept a notepad or plain text file open in which you can write notes, paste information that you have gathered, etc. The more loggi
where's the humanity! (Score:2, Interesting)
Hm... (Score:2)
Wonder if they know what they're in for... (Score:4, Funny)
Buy now! (Score:3, Interesting)
"Hackers, we'll give you $249.95 to display all of your best-kept secrets to our packet dumper so we can build it into our IDS product and nail your pasty white asses when you try it with our clients later! Buy now!"
Oh, crap. Was my sarcasm filter on?
eck (Score:2, Insightful)
What's going to happen, is with only $250 bucks as an offer, you're going to see a lot of pre-made scripts (and underground boards will have a lot of newcomers requesting new code) and rootkits that lack a lot of the more complicated tools hackers use.
In fact, one hack should always lead to
zerg (Score:2)
Just research reverse engineers instead (Score:2)
The only difference between net-based cracking and reverse engineering is the details...the thought process is the same.
Am I the only one that smells money? (Score:2, Funny)
Applied Cracker Psychology (Score:2)
"The Project is studying how hackers think..." (Score:2)
Probably won't be the most surprising findings in history.
Welcome to IRC (Score:3, Interesting)
That's no challenge (Score:2)
Now THAT could be challenging.
Re:It's easy (Score:3, Informative)
Yeah yeah, don't click on a slashdot link etc, but still...
Re:It's easy (Score:2)
Hey Mods (Score:4, Insightful)
I know, I know "only losers use IE", but last time I checked, there's no crime for using IE, and something like half of Slashdot uses it.
Perhaps we can have people post something like "hey, this is a cool link, it will delete media player from your system if you click here (don't say I didn't warn you)". Instead, we get something modded up that is far worse than that insipid goatse.cx picture.
Real way to make us look like a bunch of idiots.
And no, I'm not sitting here fuming at my own stupidity; Opera has no problem with that link at all
Re:$250? That's not even thirty pieces of silver! (Score:2)