Freq 5
|
Cryptography |
5 |
|
Freq 4
|
Cryptography |
15 |
|
Log File Analysis: Detect Privilege Escalation Attempt
|
Forensics |
5 |
|
Log File Analysis: Compromised Account Username
|
Forensics |
5 |
|
Log File Analysis: Bad Actor's IP Address
|
Forensics |
5 |
|
Log File Analysis: Analyze the Attack Method
|
Forensics |
5 |
|
PDF
|
Steganography |
5 |
|
ZigZag Alert
|
Cryptography |
10 |
|
Seasick
|
Forensics |
15 |
|
Reverse that Hash!
|
Forensics |
20 |
|
Great Mnemonics
|
Miscellaneous |
5 |
|
Lord Playfair
|
Cryptography |
10 |
|
Secret XORbit
|
Cryptography |
15 |
|
Return of the Metadata
|
Reverse Engineering |
10 |
|
Freq 2
|
Cryptography |
5 |
|
Dvorak kept the shift on left :)
|
Cryptography |
10 |
|
Shuffle up, down, and all around
|
Reverse Engineering |
5 |
|
Research Time 1
|
OSINT |
5 |
|
I like turtles
|
OSINT |
5 |
|
Submarine Sandwich Origins 2
|
OSINT |
5 |
|
EKC 4
|
OSINT |
5 |
|
EKC 3
|
OSINT |
5 |
|
Submarine Sandwich Origins
|
OSINT |
10 |
|
Email Detective
|
Forensics |
5 |
|
Fishing in the woods
|
Forensics |
5 |
|
Mixed Signals
|
Forensics |
5 |
|
I mean I love acronyms…
|
Forensics |
5 |
|
Homepage Hijinks
|
Forensics |
5 |
|
Langdon, Robert Langdon
|
Forensics |
5 |
|
Behind the Curtain
|
Forensics |
5 |
|
TalentSphere: Attributes Define You
|
Career Connections |
5 |
|
TalentSphere: Educational Pathways
|
Career Connections |
5 |
|
TalentSphere: Cyber Storytime
|
Career Connections |
5 |
|
Buff-er What?
|
Binary Exploitation |
10 |
|
Printer's Dilemma
|
Reverse Engineering |
10 |
|
Slithery Snake
|
Programming |
5 |
|
What's the code?
|
Miscellaneous |
5 |
|
Hacked?
|
Miscellaneous |
5 |
|
Modulo3: No. No way.
|
Math |
20 |
|
Modulo2: But is it always?
|
Math |
10 |
|
Modulo: It's What's Left Over
|
Math |
5 |
|
Hex?
|
Math |
5 |
|
Order of Operations
|
Math |
5 |
|