4. Don't spit on the cake
|
Cryptography |
900 |
|
11. Forge a Big MAC
|
Cryptography |
765 |
|
10. Second Pre-image Part 2
|
Cryptography |
580 |
|
9. Second Pre-image Part 1
|
Cryptography |
580 |
|
Bad Print
|
Crack Me |
770 |
|
Secrets in the Mesh
|
Encode/Decode/Cypher |
765 |
|
The Treasure in Bedford
|
Encode/Decode/Cypher |
700 |
|
Breach of Protocol
|
Network Forensics |
150 |
|
Base what?
|
Encode/Decode/Cypher |
765 |
|
Think Small
|
Encode/Decode/Cypher |
700 |
|
Shifty Fingers
|
Encode/Decode/Cypher |
900 |
|
Decoder Ring
|
Encode/Decode/Cypher |
900 |
|
Kevin who?
|
Encode/Decode/Cypher |
900 |
|
I2C you - IMAGinE that?
|
Hardware |
570 |
|
Radio Riddle
|
Vehicle |
500 |
|
Highway Sniffer
|
Vehicle |
900 |
|
5. Wrong way on a one-way street
|
Cryptography |
905 |
|
3. Squashed tomatoes and stew
|
Cryptography |
900 |
|
2. You look like a monkey...
|
Cryptography |
900 |
|
1. Intro: Breaking Modern Crypto
|
Cryptography |
800 |
|
I2C you?
|
Hardware |
740 |
|
Captured cereal?
|
Hardware |
740 |
|
Found binary, but with strings attached?
|
Hardware |
830 |
|
Change secret in EEPROM, but write protect is enabled?
|
Hardware |
900 |
|
So many streams
|
Network Forensics |
900 |
|
Let's name the streams
|
Network Forensics |
900 |
|
Bad Files
|
Network Forensics |
900 |
|
C2 IP
|
Network Forensics |
900 |
|
Comp'd IP
|
Network Forensics |
900 |
|
Supplier Breach 2
|
OSINT |
625 |
|
Array of Bytes
|
Hardware |
515 |
|
I read the rules
|
Read The Rules |
500 |
|
Supplier Breach
|
OSINT |
500 |
|
Frequent Flyer
|
OSINT |
500 |
|
Where in the world am I?
|
OSINT |
500 |
|