Banner object (1)

Hack and Take the Cash !

844 bounties in database
  Back Link to program      
07/11/2019
Absolute Technologies Lab - 100K Crypto Challenge logo
Thanks
Gift
Hall of Fame
Reward

Reward

Absolute Technologies Lab - 100K Crypto Challenge

Absolute Technologies invites you to test our first metaprogramming based quantum encryption technology. We appreciate your efforts and hard work in making our technology more secure, and look forward to working with the researcher community to create a meaningful and successful challenge. Good luck and happy hunting!

Objective/Rewards:

This program has a unique reward structure and is not a normal bug bounty. The goal here is to decrypt the following files:

You must be able to decrypt at least one file, and explain how it was done to be offered the challenge reward

Testing is only authorized on the targets listed as In-Scope. Any domain/property of Absolute Technologies not listed in the targets section is out of scope. This includes any/all subdomains not listed above.


Target Info

  • It is not a block cipher
  • Here are the hash codes of encrypted files (not in order):

MD5:b733e1d1555869594baca9046493ab7b
SHA256:4d462d6722ec3f216652e5ce8ff6459ac261a0c2425bc65c7c67c40c7fa33087
Power function:111a35e870b9e293d935c0fa6fbcfc287b5490cdd9b6734aa8d23c09df0e3fca


MD5:903bd178945b78414a25525e113a8952
SHA256:38f27f95a1b98e98b4afdd5749650c16ad434e758b3d494cc873327a78c7c029
Power function:d4fd9dfc6c77b722e7a7174102167961e9fdb8f2a7d4d3d05efbfb1ebfa09584


MD5:d13beb11fac4cd9ab2ba6787bb40e6a3
SHA256:e1a03e3aea62d25d3882e4ecc6b8c3ce1bd065c791c8ab7702da9cb060c7acee
Power function:fa394c27d2888eded0f953809bbbcde475e6d8639a9bff126f7acfc27764ccda


MD5:e2797f594b17b09c70565441294f32e7
SHA256:0088c889ea7f0c3eed2680abadc5fbc8d8bdf9ef936a4f6a626d42005e06f3ee
Power function:d92eda14fc32ee6db618e59da096febeba1819e404a1b7098409a3028a5f8321


MD5:4582079b882064950ad8ce4c64fa6165
SHA256:7ba55cf49315b0bdca5f840aed55e2531b58d9352ca96eaff1b103cfaf7af391
Power function:e000b87cf6b8db5bbf9dc47ce426820f3fae9f5faacc7b050f59dd24cab945b4



Out-of-Scope

  • Any web property and apps of Absolute Technologies
  • No Denial of Service attacks on our web properties

Safe Harbor:

When conducting vulnerability research according to this policy, we consider this research to be:

  • Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
  • Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
  • Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
  • Lawful, helpful to the overall security of the Internet, and conducted in good faith.
  • You are expected, as always, to comply with all applicable laws.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please inquire via support@bugcrowd.com before going any further.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.


This program have been found on Bugcrowd on 2019-11-07.

FireBounty © 2015-2019

Legal notices