Organizers of the CanSecWest conference happening in Vancouver next week have re-introduced their Mack Hack contest. Only this year, it’s a three-way race. Here are the rules, as explained by Dragos Rui, the conference’s organizer.Announcing CanSecWest PWN2OWN 2008.===================================Three targets, all patched. All in typical client configurations with typical user configurations. You hack it, you get to keep it.Each has a file on them and it contains the instructions and how to claim the prize.Targets (typical road-warrior clients): VAIO VGN-TZ37CN running Ubuntu 7.10 Fujitsu U810 running Vista Ultimate SP1 MacBook Air running OSX 10.5.2This year’s contest will begin on March 26th, and go during the presentation hours and breaks of the conference until March 28th.The main purpose of this contest is to present new vulnerabilities inthese systems so that the affected vendor(s) can address them.Participation is open to any registered attendee of CanSecWest 2008. Once you extract your claim ticket file from a laptop (note that doingso will involve executing code on the box, simple directory traversalstyle bugs are inadequate), you get to keep it. You also get toparticipate in 3com / Tipping Point’s Zero Day Initiative, with the topaward for remote, pre-auth, vulnerabilities being $25k. More fine printand details on the cash prizes are available from TippingPoint’s DVLabsblog (http://dvlabs.tippingpoint.com/). More fine print and rules forthe contest will be found at the http://cansecwest.com/ site.Quick Overview:-Limit one laptop per contestant.-You can’t use the same vulnerability to claim more than one box, if itis a cross-platform issue.-Thirty minute attack slots given to contestants at each box.-Attack slots will be scheduled at the contest start by the methodsselected by the judges.-Attacks are done via crossover cable. (attacker controls default route)-RF attacks are done offsite by special arrangement…-No physical access to the machines.-Major web browsers (IE, Safari, Konqueror, Firefox), widely used anddeployed plugin frameworks (AIR, Silverlight), IM clients (MSN, Adium,Skype, Pigdin, AOL, Yahoo), Mail readers (Outlook, Mail.app, Thunderbird,kmail, mutt) are all in scope.Fine Print:These computers are REAL and FULLY patched. All third party software iswidely used. There are no imitation vulnerabilities. Any exploitsuccessfully used in this contest would also compromise a significantpercentage of Internet connected hosts. Instead, players choose to usetheir exploits here, at CanSecWest PWN2OWN 2008. All successful exploitswill be turned over to the appropriate vendor and patched before detailsare made public.Rules1. Attacks remain confidential until prize is claimedPlayers will connect to the targets with a crossover cable and we willnot record the network traffic or log anything other than what is doneby default.Successful exploits can be delivered directly to Tipping Point after thewe verify that you control the target.In the event that internet connectivity is required (eg. IM clients)we will put the target online behind a firewall. We won’t sniff at thefirewall, but we can make no guarantees for upstream networks. (so becareful what you send over the Internet!)2. No wireless attacks in the conference areaPlayers with intent to use wireless attacks must inform us in advance.We will relocate to a secluded, undisclosed location to test.3. One attacker per target at a timeAs is obvious from rule #1 and rule #2, one player gets exclusive accessto any target at one time.4. Players take turns, no hogging the targetsPlayers are limited to 30 minutes per attempt. We will mercilesslydisconnect your cable at the end of each attack slot. Be fast!We will reboot the targets before each session begins.5. First come, first served access to targets.Players get in line for their turns and may take an unlimited numberof turns. If a player runs out of time and no one else is waiting foraccess to the target he may continue for another turn. Players may nothave more than 1 turn in any 30 minute period. (That means we won’treboot a target any time you feel like it)6. Remote, pre-authentication attacks are required to winPlayers may not physically touch the targets or look at the target’sdisplay. Players are required to demonstrate to our satisfaction thatarbitrary code runs on the target.7. Attackers control the default route for the target.Players may become the target’s default gateway in order to perform manin the middle attacks.8. Contest officials visit attacker web serversPlayers may direct us to visit a web server running on the player’scomputer. Players may specify which browser to use.Keep the URL reasonable. We’re not going to type weird addresses in.Once we hit enter that’s it. We will not click on any links.9. Contest officials read email from attackersAuto-preview (Preview panes, etc) is enabled on mail readers, but we willnot click on links contained therein or open attachments.10. Contest officials will add attackers on IM and read their messages.They will not click on links or open file transfers.11. Client Application list:The fully patched client-side applications that qualify for a prize includes:. Adobe PDF. Adobe Flash. Microsoft Silverlight. Microsoft Internet Explorer. Microsoft Outlook/Outlook Express. Firefox. Safari. iChat. Apple Mail. Skype. Adium. Pigdin. Kmail. Thunderbird. Evolution. mutt. AOL, Yahoo!, and MSN official IM clients. Java/JREOther software may be added to this list at our discretion of if wedeem it represents a significant attack target on normal internetclients at large.12. Winning exploits must be true 0day.They may not have already been submitted to the affected vendor orto third parties.13. Each machine will be secured to common industry best practices.We’ll get Andrea Barisani from our Hardening Linux Dojo (which stillhas seats available 🙂 to look over the Ubuntu machine, and theMicrosoft/iSec/Core DTF folks to secure the Windows boxes, and JoshRyder our local Mac zealot to look at the OSX wafer.Special Thanks:-LTC Ron Dodge, USMA, for agreeing to be in the hot seat as the judge.-The folks at 3com Tipping Point ZDI for helping out.-The folks at White Wolf Security for assistance in the design, prep, and running the challenge.–Robert McMillan Related content opinion Direct Marketing Association on information security: Be safe By Robert McMillan Apr 08, 2011 3 mins Data and Information Security opinion As violence escalates, Libya cuts off the Internet By Robert McMillan Feb 18, 2011 2 mins Core Java opinion An FBI backdoor in OpenBSD? By Robert McMillan Dec 15, 2010 5 mins Data and Information Security opinion Congressional candidate says Democrats leaked his Social Security number By Robert McMillan Sep 28, 2010 1 min Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe