The BlueHat Challenge (the “Challenge”) presents a series of computer security problems of increasing difficulty to help users build and test their computer security skills. The Challenge has three tracks: reverse engineering, vulnerability discovery, and web design vulnerabilities.
Why accept the Challenge?
How to participate
The BlueHat Challenge is no longer open to new participants. We hope you enjoyed the first edition of the challenge!
You may also be interested in the Microsoft Security Bounty Programs, which provide cash rewards for eligible individuals who identify security vulnerabilities.
A quick word from our lawyers...
By participating in the Challenge, you understand that we cannot control the incoming information you will disclose to our representatives in the course of submitting your answers in the Challenge, or what our representatives will remember about your submission. You also understand that we will not restrict work assignments of representatives who have had access to your submission. By participating in the Challenge, you agree that use of information in our representatives’ unaided memories in the development or deployment of our products or services does not create liability for us in connection with the Challenge or under copyright or trade secret law.
If you do not want to grant us these rights to your answers, please do not participate in the Challenge.
Importance of Outreach: Our strategy with security researchers
About the Program
Microsoft Security :: Bluehat Challenge | Security Collaboration | MSRC: