grkal

EHS Rizzlers

3rd place

615 points


Awards


Solves

Challenge Category Value Time
Buff-er What? Binary Exploitation 10
Log File Analysis: Detect Privilege Escalation Attempt Forensics 5
Log File Analysis: Compromised Account Username Forensics 5
HID-den Capture Binary Exploitation 10
Log File Analysis: Bad Actor's IP Address Forensics 5
Expired Hash Forensics 5
Log File Analysis: Analyze the Attack Method Forensics 5
In the Event of My Demise Reverse Engineering 10
Below the Horizon Miscellaneous 5
Seasick Forensics 15
Sekrit: The Album Forensics 10
ZigZag Alert Cryptography 10
What Flag Flies Here 2 Miscellaneous 5
What Flag Flies Here 1 Miscellaneous 5
Great Mnemonics Miscellaneous 5
Speaking of the UN… Miscellaneous 5
How many flags fly here? Miscellaneous 5
Shuffle up, down, and all around Reverse Engineering 5
Return of the Metadata Reverse Engineering 10
Homepage Hijinks Forensics 5
Wireshark D Web Security 5
Wireshark C Web Security 10
Wireshark B Web Security 10
Bad Actor Intercept Networking 10
Printer's Dilemma Reverse Engineering 10
Lord Playfair Cryptography 10
Freq 2 Cryptography 5
Email Detective Forensics 5
Wireshark 4 Networking 5
Wireshark 3 Networking 5
Wireshark 2 Networking 5
Wireshark 1 Networking 5
Freq 3 Cryptography 5
Shifty Cipher Cryptography 5
Freq 1 Cryptography 10
Dvorak kept the shift on left :) Cryptography 10
Order of Operations Math 5
Wireshark A Web Security 5
What's the code? Miscellaneous 5
Hacked? Miscellaneous 5
Slithery Snake Programming 5
No 1 Victory Toilet Cryptography 5
index.html Steganography 5
Gain Access 0