Cyber 2.0 invites you to hack its system
In collaboration with the University of North Georgia, Georgia Tech Research Institute and Conexx America Israel Business Connector, Israeli cybersecurity company Cyber 2.0 will host a unique hacking challenge — with a big windfall. The USA Hackers Challenge, to be held February 14, invites any hacker to try to penetrate the Cyber 2.0 Defense system and obtain a confidential file.
Beyond bragging rights, the winner will receive a $100,000 reward. All you have to do is get passed Cyber 2.0’s defense mechanism.
The company has created a cyber security system that is based on mathematical chaos. In the unlikely scenario that a computer is breached, the program isolates the attack and blocks the virus from spreading. Additionally, the infected computer cannot send information outside the organization – even if the computer was infected before the installation of Cyber 2.0. Participating hackers will gain access to the network via a Wi-Fi access point, the IP, admin user name and password. There will be no other special configuration, no firewalls and no antivirus programs.
How the Cyber 2.0 Hacker’s Challenge will work:
- There will be one Windows 2012r2 file server, one Windows 2012r2 DHCP server and numerous Windows 10 computers.
- The file server will be configured for file sharing, for a specific folder.
- All the computers participating in the challenge will have standard out-of-the-box Microsoft configuration, with updates.
- The only defense mechanism installed will be the Cyber2.0 system.
- Competitors will gain access to the network via a Wi-Fi access point and will receive IP from the protected DHCP Server.
- Each competitor will receive the admin user name and password of the computers participating in the challenge.
- To win the $100,000, the hacker must gain access to the server and copy a single file.
The first competition, held this past summer in Israel, invited hackers from across the globe to participate. More than 1 million attacks were launched — yet all failed.
Think you have what it takes to steal the “crown jewel” file?
The event will be held at the Georgia Tech Research Institute (GTRI) on February 14th, 2019.
Hackers, register here!
Featured images via Cyber 2.0