spacer TO LEARN THE TOOLS, TACTICS, AND MOTIVES OF THE email the Honeynet Project
About the Project
Research Alliance
Our Book

Honeynet Challenges

What is a Honeynet Challenge?

The Honeynet Project goal is to improve the security of the Internet by sharing lessons learned about the most common threats. We deploy honeynets all around the world, capture attacks in the wild, analyze this information and share our findings. Based on this information, the security community can better understand the threats they face and how to defend against them.

The purpose of Honeynet Challenges is to take this learning one step farther. Instead of having the Honeynet Project analyze attacks and share their findings, Challenges give the security community the opportunity to analyze these attacks and share their findings. The end results is not only do individuals and organizations learn about threats, but how to learn and analyze them. Even better, individuals can see the write-ups from other individuals, learning new tools and technique for analyzing attacks. Best of all, these attacks are from the wild, real hacks.

The Honeynet Project currently has three challenges, each described below.

Scan of the Month Challenges
These are monthly challenges for the security community to decode the attack in the wild. These challenges vary from month to month, from an NT webserver attack to reverse engineering malware. These also vary in degree of difficulty from Beginner, to Intermediate, to Advance.

>> You can download all archived SotM challenges here (90MB).


The Reverse Challenge
The Reverse Challenge was held from 06 May to 31 May, 2002. The Challenge was to decode a binary captured in the wild. For this Challenge, there were even prizes!. The purpose is to develop the communities understanding of the value of reverse engineering, and how to do it.

>> You can download the entire Reverse Challenge here (27MB).

rule The Forensic Challenge
The Forensic Challenge was held from 15 January - 19 February of 2001. The Challenge was to conduct a full forensic analysis of a Linux Red Hat 6.2 computer hacked in the wild. There were thirteen entries for the contest, each entry detailing how they analyzed the hacked systems.

>> You can download the entire Forensic Challenge here (12MB).

Back to Top