The Honeynet Project, which has been monitoring black hat hacking activity over the past year, has set up a new challenge to help develop reverse engineering skills throughout the security community.
Last year's project, the Forensic Challenge, formed part of study which revealed that a web server was typically scanned and compromised within 15 minutes of being hooked up to the internet.
This year's mission is to analyse and report on a binary captured in the wild, which was used to exploit one of the Honeynet machines.
Research carried out by those joining in the project will be shared with the rest of the security community, and a panel of experts will judge the submissions and hand out prizes accordingly.
Those involved in the judging include big names in security, such as Job de Haas, K2, and David Dittrich.
The black hat binary which needs analysing was released this week and all forensic submissions need to be made by 31 May.
Of course, the person who used the said binary to hack the Honeynet Project is not eligible to submit an entry, as they already know who they are and how they did it. The question to be answered by the Honeynet team is "do we?".
The Honeynet Project lives here.
Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night
Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018
Meteor showers as a service will be visible for about 100 kilometres in all directions
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago