[Busec] Fwd: Announcing the Bluehat Challenge!

Sharon Goldberg goldbe at cs.bu.edu
Sat Aug 10 03:45:09 EDT 2013


---------- Forwarded message ----------
From: David Seidman <David.Seidman at microsoft.com>
Date: Thu, Aug 1, 2013 at 8:18 PM
Subject: FW: Announcing the Bluehat Challenge!
To: Sharon Goldberg <goldbe at cs.bu.edu>

Hi Sharon,

I thought you and your students might be interested in the Bluehat
Challenge program we just launched. It’s an educational set of
computer security problems designed to be fun and challenging. See
below for more information, and full info is on the SRD blog and at


From: David Seidman
Sent: Wednesday, July 31, 2013 9:39 AM
To: TwC Security - FTE Only
Subject: Announcing the Bluehat Challenge!

We all had to start somewhere. There are many paths to becoming an
elite computer security master, and now there’s one more: the BlueHat
Challenge (the “Challenge”). This program presents a series of
computer security problems of increasing difficulty to help you build
and test your skills. It will take a rare and exceptionally skilled
person to complete all three tracks! Can you do it?

The Challenge has three tracks: reverse engineering, vulnerability
discovery, and web design vulnerabilities. For more information and to
get started, see the SRD blog and full program details at

The Challenge is designed to appeal to a wide range of people, so if
the first few sets of problems seem easy, stick with it. They’ll get

More information

·         There’s no restriction on who can participate, no time
limit, and no way to fail. Microsoft employees are welcome!

·         There is no monetary reward, and this is not a contest. Your
answers should be your own work. We hope that the fun and learning you
gain from completing the Challenge is reward enough. We do plan on
publicly recognizing people who finish the Challenge.

·         If you find this sort of thing fun, you’d probably like
working in TWC. We solve problems like this every day and we have lots
of open positions. You can see a list of our available positions at
http://www.twccareers.com, and we encourage you to submit an

You may also be interested in the Microsoft Security Bounty Programs,
which provide cash rewards for eligible individuals who identify
security vulnerabilities. Sorry, Microsoft employees are not eligible.

We encourage you to promote this program to your friends in the
security and technology community, so please post links to the
Challenge to your social media sites and forward this email to friends
and colleagues as desired!

Good luck!


Sharon Goldberg
Computer Science, Boston University

More information about the Busec mailing list