Rules of Engagement

Operational parameters for the AKM security demonstration

1 BTC
~$97,000 USD

Operational Parameters

1

Objective

Decrypt the Bitcoin wallet seed phrase from captured AKM traffic. The seed phrase is transmitted continuously between two endpoints. Successful decryption grants full wallet access.

2

Authorized Actions

  • Full packet capture of encrypted AKM traffic
  • Cryptographic analysis using any tools or techniques
  • Statistical and pattern analysis on captured data
  • Custom script execution on adversary machine
3

Out of Scope

  • Physical access to or tampering with hardware endpoints
  • Attacks against web dashboard or monitoring systems
  • Social engineering against AKM personnel
  • Denial of service or system disruption
  • Direct access attempts to AMM or endpoint systems
4

Session Parameters

4-hour session duration
30-minute idle timeout
Max 10 concurrent operators
Unlimited session attempts

Access Protocol

1

Register

Submit credentials and accept terms. Identity verification required for system access.

2

Access

Receive time-limited SSH credentials to the adversary machine with full network capture capability.

3

Operate

Capture traffic. Analyze data. Attempt decryption. Success means the asset is yours.

Operational Status: Preparation

Environment Under Deployment

The adversary environment is being provisioned. Registered hunters will receive notification when operations commence.

Register Now

Adversary Machine Configuration

Pre-installed toolset on the adversary machine:

Network Analysis

  • tshark / tcpdump
  • nmap
  • netcat
  • curl / wget

Cryptographic Tools

  • openssl
  • python3 + cryptography
  • python3 + pycryptodome
  • hashcat (CPU)

Binary Analysis

  • hexdump / xxd
  • binwalk
  • radare2
  • strings

Scripting

  • python3 + scapy
  • bash / zsh
  • perl
  • jq

Questions or Disclosures

For rule clarification or to report security findings outside the operational scope.

security@akmsecure.com