Friday, Dec 6
The BlueHat Challenge (the “Challenge”) presents a series of computer security problems of increasing difficulty to help users build and test their computer security skills. The Challenge has three tracks: reverse engineering, vulnerability discovery, and web design vulnerabilities.
Why accept the Challenge?
How to participate
To get started, email firstname.lastname@example.org and include the track that you would like to try in the subject or body enclosed in brackets:
You can participate in any or all of them. Microsoft will reply with the first set of problems in each track. Send us your answers, and we will let you know which ones you got right. If you successfully answer all the questions in a set, we will send you the next set of problems.
You may also be interested in the Microsoft Security Bounty Programs, which provide cash rewards for eligible individuals who identify security vulnerabilities.
A quick word from our lawyers...
By participating in the Challenge, you understand that we cannot control the incoming information you will disclose to our representatives in the course of submitting your answers in the Challenge, or what our representatives will remember about your submission. You also understand that we will not restrict work assignments of representatives who have had access to your submission. By participating in the Challenge, you agree that use of information in our representatives’ unaided memories in the development or deployment of our products or services does not create liability for us in connection with the Challenge or under copyright or trade secret law.
If you do not want to grant us these rights to your answers, please do not participate in the Challenge.
Importance of Outreach: Our strategy with security researchers
About the Program
Microsoft Security :: Bluehat Challenge | Security Collaboration | MSRC:
BlueHat v13 is Coming
Friday, Dec 6