The ninth annual CanSecWest 2008 Conference was held last week in Vancouver, British Columbia. CanSecWest focuses on applied digital security, bringing together ndustry luminaries in a relaxed environment that promotes collaboration and social networking.
A crowd favorite at the conference has been the hacking contest and last week the tradition continued. This year's target machines were Ubuntu, Vist and OSX based. Here's details on the contest from the CanSecWest website:
Three targets, all patched. All in typical client configurations with typical user configurations. You hack it, you get to keep it.
Each has a file on them and it contains the instructions and how to claim the prize.
Targets (typical road-warrior clients):
- VAIO VGN-TZ37CN running Ubuntu 7.10
- Fujitsu U810 running Vista Ultimate SP1
- MacBook Air running OSX 10.5.2
This year's contest will begin on March 26th, and go during the presentation hours and breaks of the conference until March 28th. The main purpose of this contest is to present new vulnerabilities in these systems so that the affected vendor(s) can address them. Participation is open to any registered attendee of CanSecWest 2008.
Once you extract your claim ticket file from a laptop (note that doing so will involve executing code on the box, simple directory traversal style bugs are inadequate), you get to keep it. You also get to participate in 3com / Tipping Point's Zero Day Initiative, with the top award for remote, pre-auth, vulnerabilities being increased this year. Fine print and details on the cash prizes are available from Tipping Point's DVLabs blog.
Quick Overview:
- Limit one laptop per contestant.
- You can't use the same vulnerability to claim more than one box, if it is a cross-platform issue.
- Thirty minute attack slots given to contestants at each box.
- Attack slots will be scheduled at the contest start by the methods selected by the judges.
- Attacks are done via crossover cable. (attacker controls default route)
- RF attacks are done offsite by special arrangement...
- No physical access to the machines.
- Major web browsers (IE, Safari, Konqueror, Firefox), widely used and deployed plugin frameworks (AIR, Silverlight), IM clients (MSN, Adium, Skype, Pigdin, AOL, Yahoo), Mail readers (Outlook, Mail.app, Thunderbird, kmail) are all in scope.
Here's more on the contest from ChannelWeb: