Welcome to the HackIIS6.com Contest! Beginning May 2nd and running until June 8th, this server (located at http://www.hackiis6.com) will welcome hackers to attack it. If you are the first person to deface the Web site or capture the "hidden" document, you win an X-box! Read the contest rules for what does and doesn't constitute a successful hack. We've tried to be as realistic as possible in what constitutes a successful hack and in mimicking a basic HTML and ASP.NET web site. For the most part, almost anything reasonable constitutes a successful attack except for a massive network denial of service (DoS) attack against the Internet Information Services (IIS) 6.0 box or its host provider. We want to test the security of Windows Server 2003, IIS, and other Microsoft applications. So, please, respect this rule of the contest so everyone can have a chance at claiming the prize. Contest Summary We are starting the contest with the very basic, static HTML Web site that you are now reading. Later, we'll add an ASP.NET Web site and a back-end SQL Server. We're starting with the basic site to test whether Microsoft's IIS 6.0 on Windows Server 2003 is secure by itself. This is to satisfy the purists who think hacking ASP.NET is hacking an application and not the server. So, if you've got skills in one area versus the other, you'll have a chance to try both attack types. The contest ends June 8th, and we will announce the results at Microsoft's Tech.Ed conference on June 9th. The Setup This server is running Windows Server 2003, Service Pack1, with all current publicly released patches and hotfixes installed (we ran Windows Update and MBSA just like you would do). We installed IIS 6.0, and then we followed Microsoft's basic recommendations (http://www.microsoft.com/technet/security/prodtech/IIS.mspx). I added a few tweaks here and there to put my personal mark on the site, but nothing extraordinary. We want this contest to test Microsoft software, and so the only third-party software we used is the host's router/firewall, which would be normal in most environments. Why a Hacking Contest? To have fun! We know there will be critics who say sponsoring a hacking contest proves nothing. If the IIS server remains unbroken, it still doesn't mean that IIS is really "secure." True, and if I weren't the contest's team leader, I'd probably be the first one to say so. Hacking contests rarely prove something is secure, although it only takes a single successful hack to prove something is not secure. So why do it? There are very few places on the Internet where hackers, good and bad, can hack legally. Windows IT Pro thought the contest would be a fun way to interact with the hacker community (they realize most hackers have good intentions) and provide a practical way for readers of Windows IT Pro to learn about security (of course, the magazine will disavow all responsibility and blame me solely if the server gets hacked) <grin>. So, welcome to the contest! Hack away. If the IIS server goes unhacked during the extended time period, it might not mean that IIS is "unhackable", but if the site does survive the contest it might convince a few people that you can implement a relatively secure Web server platform with IIS if you follow best practices and take reasonable precautions. After all, over 20 percent of the Internet relies on IIS, including some of the largest Web sites in the world. Questions and Prizes If you have questions, send an email to [EMAIL PROTECTED] If you want to claim a prize, send your email, with the details listed in the official rules to [EMAIL PROTECTED]
Happy Hacking, Roger A. Grimes Contributing editor, Windows IT Pro Magazine ========================================Hack IIS 6.0 Challenge Contest Rules A successful "hack" of the IIS server contest will be any modification of any content on the web server computer, IIS, or the database server computer or disclosure to the contest officials (at the email address cited herein) of data from the web server or database computer not published on the hackiis6.com web site. A successful hack includes: Successful web site defacement (subject to the limitations as indicated below) Modification of web server or database computers Proven knowledge of content located in "hidden" Microsoft Word document. Proven knowledge of other content found on the web server or database computer. A successful hack does not include: External denial of service attack against web server computer, or any participating vendor, or device. Denial of service attacks due to successfully modified content on web server computer are fair game. Attacks or modifications of any computer or device besides web server or database computers. Attacks involving external domain naming services. Publishing readily available directory or file listings without accessing or modifying files on the web server or database computer. Physical attacks. Final decision on what constitutes a successful hack rests solely with the hackiis6.com team officials. The prize for the first successful hack, if there is one, is a Microsoft Xbox console package. In order for prize to be awarded, the hacker must send an email with the details of the hack to [EMAIL PROTECTED] and include the following: Date and time of hack success Legal name of hacker and/or team Email address of contact person Description of hack sufficient to verify that it took place Description of how hack was accomplished The above must be sent to [EMAIL PROTECTED] within 12 hours of successful hack, AND prior to midnight EDT June 8, 2005. In order to qualify for winning prize, winner agrees to the following conditions: Not to reveal any mention of hack success for 24 hours to anyone but the hackiis6.com email address listed above. Not to reveal details of the hack for 30 days unless given prior approval by the hackiis6.com contest management team. Not to modify any content or deface web site in a vulgar or derogatory manner; and agrees not to promote any product, person, team, software, tool, company, etc. during any possible defacement. Any modified content cannot include content not created, owned, or licensed by hacker. Any hacks must be able to be demonstrated and readily recreated. To abide by all contest rules and decisions. Windows IT Pro reserves the right to include details of potential hack(s) as the basis for editorial coverage. Contest open to anyone at least 18 years old as of date of entry. Void where prohibited by law. Employees and agents/contractors of Windows IT Pro [Penton Media, Inc.], or Microsoft and its respective parents, affiliated and subsidiary companies, and advertising and promotional agencies, and of prize sponsors, as well as the immediate family of such employees or members of their households are not eligible to participate in this challenge. Winner is responsible for all taxes and will be required to provide proof of identity. Sponsor: Windows IT Pro, Penton Media, Inc., 221 E. 29th Street, Loveland, CO 80538. ======================================================== Sequence of Events May 2 - Challenge begins with very basic static HTML web site to focus hackers on hacking IIS code May 16 - ASP.NET web site put up to give more potential hacking angles June 8 - Contest ends June 9 - Winner (or lack of winner) announced at TechEd in Orlando. Visit the Windows IT Pro booth around noon June 9 for announcement. Watch for an upcoming issue of Windows IT Pro magazine to see Roger's recap of the contest, where he shares the secrets of creating an impenetrable IIS environment. Best Regards, ~-V-~ Official Web Site : http://www.awari.or.id Unsubscribe: [EMAIL PROTECTED] Web,archive: http://groups.yahoo.com/group/asosiasi-warnet Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/asosiasi-warnet/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/

