Wow. I was prepared to denounce this as a fake, mouthpiece for LulzSec made to look like a hacking challenge (for the lulz), etc. A facebook page like this[1] is so laughably over the top.. But perhaps not:
Now I just feel a bit sorry for him. A very fast lesson to not consider yourself "trained by the best in the world" or go around putting up $10k prizes like this without actually having a few crises under your belt.
He has a bachelors in "Information Security" from ITT Tech.
For those who aren't familiar, ITT Tech is, at least in the midwest, where the stoners go after getting their GED (remedial high school diploma for people who couldn't hack it in...secondary...) because they realized minimum wage jobs don't go very far once you're paying your own rent.
The raw hubris of this video and his reasons for it are...overwhelming.
I'm left feeling assured about my future job prospects, and unhappy at the state of things.
I don't know that the ITT Tech thing is enough to condemn him. Sure, it's a crappy school, but great people can rise from humble places. One of the absolute very best programmers I know has something like two ITT Tech courses under his belt, and is entirely self-educated beyond that.
This guy doesn't need any credentials to prove he's a fool.
I would just like to note that the have an error on that page.
<b>Warning</b>: INSERT command denied to user 'dbo325141527'@'74.208.180.97' for table 'bs_watchdog'
query: INSERT INTO bs_watchdog
(uid, type, message, variables, severity, link, location, referer, hostname, timestamp)
VALUES
(0, 'php', '%message in %file on line %line.', 'a:4:{s:6:\"%error\";s:12:\"user warning\";s:8:\"%message\";s:655:\"INSERT command denied to user &#039;dbo325141527&#039;@&#039;74.208.180.97&#039; for table &#039;bs_accesslog&#039;\nquery: INSERT INTO bs_accesslog (title, path, url, hostname, uid, sid, timer, timestamp) values(&#039;Cybersecurity For The 21st Century, Hacking Challenge: Change this website&amp;#039;s homepage picture and win $10K and a position working with Senior Cybersecurity Advisor, Joe Black. DONE, THAT WAS EASY. KEEP YOUR MONEY WE DO IT FOR THE LULZ&#039;, &#039;node/1&#039;, &#039;http://www.google.com/reader/view/?at=A_uCkSZxuRDNUf in <b>/homepages/6/d325020610/htdocs/includes/database.mysql.inc</b> on line <b>128</b><br />
i guess it makes sense to run 'competitions' like this. if a 0-day exploit is used, the method can be studied to a great benefit.. even be re-sold later to recoup the costs:)
http://www.youtube.com/watch?v=5ywUK2Jat5k
Now I just feel a bit sorry for him. A very fast lesson to not consider yourself "trained by the best in the world" or go around putting up $10k prizes like this without actually having a few crises under your belt.
[1] https://www.facebook.com/blackandberg