C.

4th place

810 points


Awards


Solves

Challenge Category Value Time
Bandit 0 S2 Week 1: Beginner Linux Exploitation 5
Bandit 1 S2 Week 1: Beginner Linux Exploitation 5
Nebula 0 S2 Week 1: Intermediate Linux Exploitation 10
Nebula 1 S2 Week 1: Intermediate Linux Exploitation 10
Nebula 3 S2 Week 1: Intermediate Linux Exploitation 10
Nebula 5 S2 Week 1: Intermediate Linux Exploitation 10
Nebula 14 S2 Week 1: Intermediate Linux Exploitation 10
Bandit 2 S2 Week 1: Beginner Linux Exploitation 5
Bandit 3 S2 Week 1: Beginner Linux Exploitation 5
Bandit 4 S2 Week 1: Beginner Linux Exploitation 5
Bandit 5 S2 Week 1: Beginner Linux Exploitation 5
Bandit 6 S2 Week 1: Beginner Linux Exploitation 5
Bandit 7 S2 Week 1: Beginner Linux Exploitation 5
Bandit 8 S2 Week 1: Beginner Linux Exploitation 5
Bandit 9 S2 Week 1: Beginner Linux Exploitation 5
Bandit 10 S2 Week 1: Beginner Linux Exploitation 5
Bandit 11 S2 Week 1: Beginner Linux Exploitation 5
Bandit 12 S2 Week 1: Beginner Linux Exploitation 5
Bandit 13 S2 Week 1: Beginner Linux Exploitation 5
Bandit 14 S2 Week 1: Beginner Linux Exploitation 5
Bandit 15 S2 Week 1: Beginner Linux Exploitation 5
Bandit 16 S2 Week 1: Beginner Linux Exploitation 5
Bandit 17 S2 Week 1: Beginner Linux Exploitation 5
Bandit 18 S2 Week 1: Beginner Linux Exploitation 5
Bandit 19 S2 Week 1: Beginner Linux Exploitation 5
Bandit 20 S2 Week 1: Beginner Linux Exploitation 5
Bandit 21 S2 Week 1: Beginner Linux Exploitation 5
Bandit 22 S2 Week 1: Beginner Linux Exploitation 5
Bandit 23 S2 Week 1: Beginner Linux Exploitation 5
Bandit 24 S2 Week 1: Beginner Linux Exploitation 5
Bandit 25 S2 Week 1: Beginner Linux Exploitation 5
Bandit 26 S2 Week 1: Beginner Linux Exploitation 5
Bandit 27 S2 Week 1: Beginner Linux Exploitation 5
Bandit 28 S2 Week 1: Beginner Linux Exploitation 5
Bandit 29 S2 Week 1: Beginner Linux Exploitation 5
Bandit 30 S2 Week 1: Beginner Linux Exploitation 5
Bandit 31 S2 Week 1: Beginner Linux Exploitation 5
Bandit 32 S2 Week 1: Beginner Linux Exploitation 5
Bandit 33 S2 Week 1: Beginner Linux Exploitation 5
Base-ic Cryptography S2 Week 2: Cryptography 10
Caesar Salad S2 Week 2: Cryptography 15
Le cryptosystème incassable S2 Week 2: Cryptography 25
Exclusively Original S2 Week 2: Cryptography 30
Seedy Randomness S2 Week 2: Cryptography 40
ReallyStrongAlgorithm 1 S2 Week 2: Cryptography 60
Crib Dragon S2 Week 2: Cryptography 50
Nebula 4 S2 Week 1: Intermediate Linux Exploitation 10
Nebula 6 S2 Week 1: Intermediate Linux Exploitation 10
Even Seedier Randomness S2 Week 2: Cryptography 55
ReallyStrongAlgorithm 2 S2 Week 2: Cryptography 70
Credit Card S2 Week 2: Cryptography 100
Nebula 8 S2 Week 1: Intermediate Linux Exploitation 10
Nebula 12 S2 Week 1: Intermediate Linux Exploitation 10
Nebula 2 S2 Week 1: Intermediate Linux Exploitation 10
Debugging Fans S1 Week 5: Reverse Engineering 10
Reversing Enjoyers S1 Week 5: Reverse Engineering 15
Two More Steps Are Needed S1 Week 5: Reverse Engineering 20
Borobudur S1 Week 7: Reverse Engineering 15
Going Cocaine S1 Week 5: Reverse Engineering 25