Linux Reverse Engineering Hacker Challenge

The first round results of the Linux Reverse Engineering Hacker Challenge are out!

It was expected that an intermediate hacker with Linux experience should be able to defeat the protection(s) in less than 10 hours. Participants may earn up to $4100 USD.

A total of 93 individuals registered to participate in the first Hacker Challenge. Individuals were compensated for defeating the protection and submitting a report that summarized how the defeat was executed. All individuals who defeated the protection and submitted a sufficient report were compensated with $500, while a partial defeat which was accompanied by a complete report was compensated with $200 (all payments in US dollars, with payments made anonymously via PayPal). Special payments were made for the first three successful defeats, as well as the top-three highest-quality reports

The competition is apparently run by a US based company anonymously and all payouts are made via PayPal.

We are a US company performing security testing and security metric research. This activity is being funded by a component of the US government.

The purpose of this project is to evaluate the effectiveness of software anti-piracy protections. The results of this effort will be used to improve our protection measures.

Perhaps something to do with the RIAA or DMCA as they are evaluating anti-piracy measures.

This is a security testing activity. All software and software anti-piracy measures were developed exclusively for use in this effort. No commercial protections were used in the development of this test.

Do watch out for the next competition from Hacker Challenge!

Posted in: Linux Hacking, Secure Coding

, , , ,

Latest Posts:

SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.

8 Responses to Linux Reverse Engineering Hacker Challenge

  1. SN July 2, 2007 at 3:17 pm #

    This is an interesting challenge.


  2. tekse7en March 2, 2008 at 6:49 am #

    Does anyone know of any other hacking challenges/competitions? You here about some of these with 50k prizes, but I can never find them… not that I’m into computers for the money, but, hey, a guys gotta eat lol.

  3. Pantagruel March 2, 2008 at 9:02 am #

    A compilation of some challenge (did not check the if you will be rewarded!)

  4. Bogwitch March 3, 2008 at 9:44 pm #

    Shouldn’t there be health warnings on any link to a * address?

  5. Pantagruel March 3, 2008 at 10:02 pm #


    LOL, a dead give away, ‘ astalavista ‘ must have been one of your frequented websites ;)

    btw is also sponsored by GFi, guess GFi isn’t eager on affiliating with rogue sites so it appears to be save (i guees).

  6. Bogwitch March 3, 2008 at 10:17 pm #

    Hehehe – yup – used to be!

  7. zupakomputer March 4, 2008 at 2:12 pm #

    Is blacksunbox still about? I used to read over their tutorials back when I knew absolut-zero about networks. That was back when a bookstore in the city here actually stocked 2600 regularly.

    Not sure about any hacking competitions…..probably worth checking the links page / navbar here, and hopping off from there to other sites and chats.

  8. Pantagruel April 4, 2008 at 6:45 pm #


    You mean, that has disappeared ages ago.
    If you do a google these days you’ll find a Madrid based ‘rock’ band by that name.

    Have a look at (archive)

    or for more recent stuff