- Comunidad Linux
- Mac
- Micro$oft
- VAIO VGN-TZ37CN running Ubuntu 7.10
- MacBook Air running OSX 10.5.2 (Leopard)
- Fujitsu U810 running Vista Ultimate SP1
Quick Overview:
- Limit one laptop per contestant.
- You can't use the same vulnerability to claim more than one box, if it is a cross-platform issue.
- Thirty minute attack slots given to contestants at each box.
- Attack slots will be scheduled at the contest start by the methods selected by the judges.
- Attacks are done via crossover cable. (attacker controls default route)
- RF attacks are done offsite by special arrangement...
- No physical access to the machines.
- Major web browsers (IE7, Safari, Konqueror, Firefox), widely used and deployed plugin frameworks (AIR, Silverlight), IM clients (MSN, Adium, Skype, Pigdin, AOL, Yahoo), Mail readers (Outlook, Mail.app, Thunderbird, kmail) are all in scope.
En la red inalámbrica, tiempo necesitado por los corsarios informáticos [crackers y ciertos hackers] para irrumpir por la red en los equipos, aprovechando errores de la seguridad del sistema operativo y sus aplicaciones (exploits):
Mac Leopard: En 2 minutos
M$ Vista: En 2 días
Linux Ubuntu: Siguen probando...
No comments:
Post a Comment