“Break In If You Can” is official hacking contest organized by The International Institute of Information Technology, Hyderabad, India.
This hacking contest is organized as part of Felicity, the annual cultural and technical festival, to be held from 18th – 20th February, 2011.
Real Hacking Contest!
Most hacking challenges creates a dummy site/scenario where organizers know in advance how far you can go! In most of those challenges, once you uncover security holes, you are often encountered with a lame message congratulating you.
But in this real hacking contest, you are expected to hack into IIIT Hyderabad’s website itself i.e. http://iiit.ac.in/
They have promised not to sue you but make sure if you break-in successfully rather than damaging and creating havoc, you contact organizers to claim your prize. 😉
Prizes:
As per official site 1st Prize is Rs. 5000. But I personally feel that this hacking contest itself is bigger than any other prize! 😉
Though, you can see complete list of prizes here.
Event Date:
The test run will be on Jan 29th, 2010 i.e. tomorrow and main contest will be on Jan 30th 2010. Time will be 10PM IST.
Link: Break In If You Can
5 Comments
Wow I am sure many hackers will be interested..it looks so amazing 😉
@ Rahul : Its good to see you post after a long time.
@ Post : Hacking the site and being acclaimed is much greater than the prize money itself. Um wishing best of luck to all my hacker friends 🙂
Thanks Gourav.. 🙂
First they need to protect their website..lol their website was hacked by some hacker ..how they conduct hacking competition lol
I noticed their site is running very slow at the moment but its not certainly hacked. Its opened very well here.
2 points:
First the competition is over 4 days back.
Second the competition aim was to get their site hacked. So even it would have been hacked, that was supposed to be expected thing! 😉
Technically no site in this world is unhackable. So if any site gets hacked its not a big deal as long as private information like password is protected using proper hashing algorithms.
Incident like Lifehacker user’s password leak was real shameful – https://devilsworkshop.org/alert-gawkers-source-code-user-database-download-torrent/