[olug] Reverse Challenge - Binary released (fwd)

Matthew G. Marsh mgm at midwestlinux.com
Mon May 6 16:07:43 UTC 2002


FYI.

---------- Forwarded message ----------
Date: Sun, 5 May 2002 21:06:01 -0500 (CDT)
From: Lance Spitzner <lance at honeynet.org>
To: forensics at securityfocus.com
Subject: Reverse Challenge - Binary released

As announced several days ago, the Honeynet Project is
sponsoring the Reverse Challenge.  The binary has now been
officially released.  You have the next four weeks, until
24:00 GMT on Friday, 31 May, 2002, to send in your
submissions.

       http://project.honeynet.org/reverse/

WARNING:  This binary was captured in the wild.  It is
code developed and used by the blackhat community.  Do
not use a production system to analyze the binary.  This
binary has not been modified in anyway by the Project.
What we found is what you get.

On Monday, 27 May, 2002, the Honeynet Project will be
releasing additional data.  One of the questions in the
challenge is to identify the encoding process of the binary,
and develop a decoder.  The data we release on the 27th will
be encoded information, allowing you to test your decoder.


All questions and submissions should be sent to

         <challenge at honeynet.org>

Best of luck!

-- 
Lance Spitzner
http://project.honeynet.org


-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_

For help contact olug-help at olug.org - run by ezmlm
to unsubscribe, send mail to olug-unsubscribe at olug.org
or `mail olug-unsubscribe at olug.org < /dev/null`
(c)1998-2002 OLUG http://www.olug.org

-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_




More information about the OLUG mailing list