The Honeynet Project goal is to improve the security of the Internet by sharing lessons
learned about the most common threats. We deploy honeynets all around
the world, capture attacks in the wild, analyze this information and share our
findings. Based on this information, the security community can better understand
the threats they face and how to defend against them.
The purpose of Honeynet Challenges is to take this learning one step farther.
Instead of having the Honeynet Project analyze attacks and share their findings,
Challenges give the security community the opportunity to analyze these attacks
and share their findings. The end results is not only do individuals and organizations
learn about threats, but how to learn and analyze them. Even better, individuals
can see the write-ups from other individuals, learning new tools and technique
for analyzing attacks. Best of all, these attacks are from the wild, real hacks.
The Honeynet Project currently has three challenges, each
described below.
Scan of the Month Challenges
These are monthly challenges for the security community to decode the attack
in the wild. These challenges vary, from an NT webserver attack to reverse
engineering malware. These also vary in degree of difficulty from Beginner,
to Intermediate, to Advance. Note: Due to resource limitations,
we can no longer provide these challenges every month.
>> You can download all archived SotM challenges
here (90MB).
The Reverse
Challenge
The Reverse Challenge was held from 06 May to 31 May, 2002. The Challenge was
to decode a binary captured in the wild. For this Challenge, there were even
prizes!. The purpose is to develop the communities understanding of the value
of reverse engineering, and how to do it.
>> You can download the entire Reverse
Challenge here (27MB).
The Forensic Challenge
The Forensic Challenge was held from 15 January - 19 February of 2001. The Challenge
was to conduct a full forensic analysis of a Linux Red Hat 6.2 computer hacked
in the wild. There were thirteen entries for the contest, each entry detailing
how they analyzed the hacked systems.
>> You can download the entire Forensic
Challenge here (12MB). |