Quote:
Originally Posted by Foster
As a security professional, and having seen the keys they used the last years, breaking into the document in a short time isn't possible. (unless FIRST/AndyMark lends you the 2.3 million node cluster they built to run FIRST Choice  )
|
I've done my fair share of Cyber Defense Competitions at ISU (on blue, green, and red teams) and I would say that the easiest way would be to social engineer it out of one of people who holds the key to the fortress through an online login, just chatting on the phone, or sneaking into FIRST HQ (although they are probably smarter than you). If you are really that bored right now, you could be doing some other things, such as learning about
social engineering on Youtube.