Buff-er What?
|
Binary Exploitation |
10 |
|
Log File Analysis: Detect Privilege Escalation Attempt
|
Forensics |
5 |
|
Log File Analysis: Compromised Account Username
|
Forensics |
5 |
|
HID-den Capture
|
Binary Exploitation |
10 |
|
Log File Analysis: Bad Actor's IP Address
|
Forensics |
5 |
|
Expired Hash
|
Forensics |
5 |
|
Log File Analysis: Analyze the Attack Method
|
Forensics |
5 |
|
In the Event of My Demise
|
Reverse Engineering |
10 |
|
Below the Horizon
|
Miscellaneous |
5 |
|
Seasick
|
Forensics |
15 |
|
Sekrit: The Album
|
Forensics |
10 |
|
ZigZag Alert
|
Cryptography |
10 |
|
What Flag Flies Here 2
|
Miscellaneous |
5 |
|
What Flag Flies Here 1
|
Miscellaneous |
5 |
|
Great Mnemonics
|
Miscellaneous |
5 |
|
Speaking of the UN…
|
Miscellaneous |
5 |
|
How many flags fly here?
|
Miscellaneous |
5 |
|
Shuffle up, down, and all around
|
Reverse Engineering |
5 |
|
Return of the Metadata
|
Reverse Engineering |
10 |
|
Homepage Hijinks
|
Forensics |
5 |
|
Wireshark D
|
Web Security |
5 |
|
Wireshark C
|
Web Security |
10 |
|
Wireshark B
|
Web Security |
10 |
|
Bad Actor Intercept
|
Networking |
10 |
|
Printer's Dilemma
|
Reverse Engineering |
10 |
|
Lord Playfair
|
Cryptography |
10 |
|
Freq 2
|
Cryptography |
5 |
|
Email Detective
|
Forensics |
5 |
|
Wireshark 4
|
Networking |
5 |
|
Wireshark 3
|
Networking |
5 |
|
Wireshark 2
|
Networking |
5 |
|
Wireshark 1
|
Networking |
5 |
|
Freq 3
|
Cryptography |
5 |
|
Shifty Cipher
|
Cryptography |
5 |
|
Freq 1
|
Cryptography |
10 |
|
Dvorak kept the shift on left :)
|
Cryptography |
10 |
|
Order of Operations
|
Math |
5 |
|
Wireshark A
|
Web Security |
5 |
|
What's the code?
|
Miscellaneous |
5 |
|
Hacked?
|
Miscellaneous |
5 |
|
Slithery Snake
|
Programming |
5 |
|
No 1 Victory Toilet
|
Cryptography |
5 |
|
index.html
|
Steganography |
5 |
|
Gain Access
|
|
0 |
|