Nytro Posted May 23, 2011 Report Posted May 23, 2011 iAWACS 2011 Forensics challenge Sunday, May 22, 2011Hi to all(French version below)The Forensics challenge for iAWACS 2011 is now open. It is inspired from a real case on which a new information hiding techniques has been created. The aim is to test its strength and its security on a almost real implementation (and not with respect to academic conditions).Tactical scheme: a terrorist attack against the RSSIL 2011 event has been prepared according to some intelligence reports. A terrorist has been caught by the French police forces while he was about to recuperate a cell phone hidden in a geocache. Despite the efforts of the Police forensics and technical teams, the analysis of the cell phone has not been successful yet. However, the analysis proved that the Dcim directory is containing a secret message hidden.The terrorist confessed that he was waiting for a call to him on this cell phone to receive instructions about another geocache. This second one contains a SD card with the application to access the secret message. Unfortunately, this call will never happen (newspapers have leaked on this arrest).So will you be clever and imaginative enough to recover the secret message and prevent the attack against RSSIL 2011?Here are the condition for the challenge: * Opening date: May 22nd, 2011. The file dcim.tgz contains the Camera directory (the phone is a Samsung Galaxy S). * Award ceremony (if any winner) or technical hints at the RSSIL 2011 event to go on with the challenge. * End of the challenge: December 31st, 2011. * The solution must sent to iawacs@esiea.fr. Rules of the challenge: * The prize (5000 euros) will be awarded to anyone able to recover the message and the hiding mechanism only. * The technical mechanism will not be disclosed (unless by a potential winner who is free to publish any information with respect to it) by the organizers of the challenge. Only the secret message will be published once the challenge is closed. * Any partial solution, hint or valuable information will be considered for a honor award. Have a nice challenge and good luck guys!Sursa: Operational cryptology and virology lab: iAWACS 2011 Forensics challenge Quote