The Honeynet Project, which has been monitoring black hat hacking activity over the past year, has set up a new challenge to help develop reverse engineering skills throughout the security community.
Last year's project, the Forensic Challenge, formed part of study which revealed that a web server was typically scanned and compromised within 15 minutes of being hooked up to the internet.
This year's mission is to analyse and report on a binary captured in the wild, which was used to exploit one of the Honeynet machines.
Research carried out by those joining in the project will be shared with the rest of the security community, and a panel of experts will judge the submissions and hand out prizes accordingly.
Those involved in the judging include big names in security, such as Job de Haas, K2, and David Dittrich.
The black hat binary which needs analysing was released this week and all forensic submissions need to be made by 31 May.
Of course, the person who used the said binary to hack the Honeynet Project is not eligible to submit an entry, as they already know who they are and how they did it. The question to be answered by the Honeynet team is "do we?".
The Honeynet Project lives here.
Acton's warnings come as Facebook is embroiled in one of the biggest data scandals in history
The unmanned tanks could eventually be kitted with AI systems
Dubbed I-MacEtch, it will help meet demand for more powerful nano-tech
GPU firm's research unit for self-driving cars is growing