Skip to content
AJ Hammond edited this page Apr 11, 2022 · 1 revision

Heyo!

So, this week we demoed what we have so far to Prof. Cindric, and have clear next steps. We put out a Press Release today, and will begin development of the scoring system.

The prototype of the scoring system should not be too hard, however implementing true scoring will require some collaboration with Ken Smith, since the traditional way to score intentionally vulnerable machines is to generate a random md5 hash, plant it on the root user's folder on the machine (proof.txt), then place those values in the SQL entry tied to the machine. Once the user compromises the machine, he can cat the md5 hash, and enter the hash into our scoring mechanism, and if/when the hashes match, the user is awarded points.

Let's see how this goes!

AJ

Clone this wiki locally