Members
User Name | Score |
hunter.sacky | 15980 |
rachid afaf | 500 |
Awards
Hint 92
hints
Hint for Supplier Breach
-50
Hint 85
hints
Hint for Supplier Breach
-10
Solves
Challenge | Category | Value | Time |
Array of Bytes | Hardware | 515 | |
Change secret in EEPROM, but write protect is enabled? | Hardware | 900 | |
Found binary, but with strings attached? | Hardware | 830 | |
Password Pursuit | Hardware | 730 | |
Firmware Frenzy: Cracking the Code | Hardware | 560 | |
Highway Sniffer | Vehicle | 900 | |
Data Drifting | Vehicle | 550 | |
Radio Riddle | Vehicle | 500 | |
Let's name the streams | Network Forensics | 900 | |
Breach of Protocol | Network Forensics | 150 | |
Bad Files | Network Forensics | 900 | |
C2 IP | Network Forensics | 900 | |
So many streams | Network Forensics | 900 | |
Comp'd IP | Network Forensics | 900 | |
5. Wrong way on a one-way street | Cryptography | 905 | |
3. Squashed tomatoes and stew | Cryptography | 900 | |
2. You look like a monkey... | Cryptography | 900 | |
1. Intro: Breaking Modern Crypto | Cryptography | 800 | |
The Treasure in Bedford | Encode/Decode/Cypher | 700 | |
Frequent Flyer | OSINT | 500 | |
Think Small | Encode/Decode/Cypher | 700 | |
Where in the world am I? | OSINT | 500 | |
I read the rules | Read The Rules | 500 |