The Honeynet Project, which has been monitoring black hat hacking activity over the past year, has set up a new challenge to help develop reverse engineering skills throughout the security community.
Last year's project, the Forensic Challenge, formed part of study which revealed that a web server was typically scanned and compromised within 15 minutes of being hooked up to the internet.
This year's mission is to analyse and report on a binary captured in the wild, which was used to exploit one of the Honeynet machines.
Research carried out by those joining in the project will be shared with the rest of the security community, and a panel of experts will judge the submissions and hand out prizes accordingly.
Those involved in the judging include big names in security, such as Job de Haas, K2, and David Dittrich.
The black hat binary which needs analysing was released this week and all forensic submissions need to be made by 31 May.
Of course, the person who used the said binary to hack the Honeynet Project is not eligible to submit an entry, as they already know who they are and how they did it. The question to be answered by the Honeynet team is "do we?".
The Honeynet Project lives here.
Indonesian overclocker Ivan Cupa (with the aid of a lot of liquid nitrogen) achieves record overclock on AMD's latest Threadripper
Ssupermassive black hole is so big it corresponds to four per cent of the galaxy's total mass
Imminent attack will target a single bank with cloned cards used to fraudulently withdraw millions over one weekend
Using photocatalysts to convert carbon dioxide into usable energy such as methane or ethane