Astrixo
>>>
from
user
import
place
# 1st
>>>
from
user
import
score
# 8675 points
>>>
from
user
import
affiliation
# UNG
>>>
from
user
import
country
# United States
Solves
Challenge | Category | Value | Time |
Worksite | Web Exploitation | 300 | |
I have a bad feeling about this | Forensics | 300 | |
What's Cold as Ice? | Steganography | 300 | |
Slow Auth | PWN | 300 | |
Logger | Network Traffic Analysis | 100 | |
All Geared Up | Cryptography | 500 | |
Mind Games | Cryptography | 400 | |
Farm Noise | Cryptography | 100 | |
Walk Down Memory Lane | Reverse Engineering | 200 | |
Faulty disk | Forensics | 150 | |
Blue | Web Exploitation | 200 | |
MUSIC | Forensics | 300 | |
The Intern Challenge3 Part3 | Password Cracking | 50 | |
The Intern Challenge3 Part2 | Password Cracking | 50 | |
The Intern Challenge3 Part1 | Password Cracking | 50 | |
Implement RSA | Cryptography | 500 | |
Implement RSA | Cryptography | 500 | |
On The Fence | Cryptography | 100 | |
The Intern Challenge4 Part3 | Password Cracking | 100 | |
Great Code | Forensics | 350 | |
Undercomplicated | Forensics | 50 | |
The Intern Challenge4 Part2 | Password Cracking | 100 | |
The Intern Challenge4 Part1 | Password Cracking | 100 | |
WiFi Spy | OSINT | 400 | |
The Leak | OSINT | 200 | |
The Shed | OSINT | 200 | |
Wonderous | OSINT | 100 | |
Flow With The Water | Network Traffic Analysis | 200 | |
Simple Sniffer | Network Traffic Analysis | 100 | |
The Basics | Reverse Engineering | 50 | |
Blinded | Forensics | 200 | |
Run | Forensics | 150 | |
Electronic Cooked Book | Cryptography | 400 | |
Shuffle | Cryptography | 50 | |
The Intern Challenge2 Part3 | Password Cracking | 50 | |
The Intern Challenge2 Part1 | Password Cracking | 50 | |
The Intern Challenge2 Part2 | Password Cracking | 50 | |
The Intern Challenge1 Part3 | Password Cracking | 25 | |
The Intern Challenge1 Part2 | Password Cracking | 25 | |
The Intern Challenge1 Part1 | Password Cracking | 25 | |
The Real Deal | Password Cracking | 100 | |
Getting There | Password Cracking | 100 | |
Client vs Server | Web Exploitation | 100 | |
WIP | Web Exploitation | 100 | |
Off the Rails | Cryptography | 100 | |
Warm Up | Password Cracking | 100 | |
Old School | Cryptography | 100 | |
Hide and Seek | Reverse Engineering | 100 | |
Between the Lines | Reverse Engineering | 100 | |
Magic | Forensics | 100 | |
Hidden Bugs | Forensics | 100 | |
Under the Sea | OSINT | 100 | |
Lost In Time | OSINT | 100 |