Rules of Engagement
Operational parameters for the AKM encryption challenge
Operational Parameters
Objective
Decrypt the protected data from captured AKM traffic. Sensitive data is transmitted continuously between two endpoints. Successful decryption proves a vulnerability in AKM encryption.
Authorized Actions
- Full packet capture of encrypted AKM traffic
- Cryptographic analysis using any tools or techniques
- Statistical and pattern analysis on captured data
- Custom script execution on adversary machine
Out of Scope
- Physical access to or tampering with hardware endpoints
- Attacks against web dashboard or monitoring systems
- Social engineering against AKM personnel
- Denial of service or system disruption
- Direct access attempts to AMM or endpoint systems
Session Parameters
Access Protocol
Register
Submit credentials and accept terms. Identity verification required for system access.
Access
Receive time-limited SSH credentials to the adversary machine with full network capture capability.
Operate
Capture traffic. Analyze data. Attempt decryption. Prove the encryption is breakable.
Environment Under Deployment
The adversary environment is being provisioned. Registered participants will receive notification when operations commence.
Register NowAdversary Machine Configuration
Pre-installed toolset on the adversary machine:
Network Analysis
- tshark / tcpdump
- nmap
- netcat
- curl / wget
Cryptographic Tools
- openssl
- python3 + cryptography
- python3 + pycryptodome
- hashcat (CPU)
Binary Analysis
- hexdump / xxd
- binwalk
- radare2
- strings
Scripting
- python3 + scapy
- bash / zsh
- perl
- jq
Questions or Disclosures
For rule clarification or to report security findings outside the operational scope.
security@akmsecure.com