Rules of Engagement
Operational parameters for the AKM security demonstration
Operational Parameters
Objective
Decrypt the Bitcoin wallet seed phrase from captured AKM traffic. The seed phrase is transmitted continuously between two endpoints. Successful decryption grants full wallet access.
Authorized Actions
- Full packet capture of encrypted AKM traffic
- Cryptographic analysis using any tools or techniques
- Statistical and pattern analysis on captured data
- Custom script execution on adversary machine
Out of Scope
- Physical access to or tampering with hardware endpoints
- Attacks against web dashboard or monitoring systems
- Social engineering against AKM personnel
- Denial of service or system disruption
- Direct access attempts to AMM or endpoint systems
Session Parameters
Access Protocol
Register
Submit credentials and accept terms. Identity verification required for system access.
Access
Receive time-limited SSH credentials to the adversary machine with full network capture capability.
Operate
Capture traffic. Analyze data. Attempt decryption. Success means the asset is yours.
Environment Under Deployment
The adversary environment is being provisioned. Registered hunters will receive notification when operations commence.
Register NowAdversary Machine Configuration
Pre-installed toolset on the adversary machine:
Network Analysis
- tshark / tcpdump
- nmap
- netcat
- curl / wget
Cryptographic Tools
- openssl
- python3 + cryptography
- python3 + pycryptodome
- hashcat (CPU)
Binary Analysis
- hexdump / xxd
- binwalk
- radare2
- strings
Scripting
- python3 + scapy
- bash / zsh
- perl
- jq
Questions or Disclosures
For rule clarification or to report security findings outside the operational scope.
security@akmsecure.com