Ctrl + Alt + Sabers

1st place

1788 points


Members

User Name Score
75rd6mxe 880
d8hgs23 110
anzbwprh 248
nzur6cfp8 305
fa7uyvtx 245

Awards


Hint 69

hints

Hint for Password Breach 1

-5


Hint 61

hints

Hint for Hide and Seek

-5


Solves

Challenge Category Value Time
Gain Access 0
War Games Grab-Bag 5
Atbash Cryptography 10
Bacon Cryptography 10
Caesar Cryptography 10
Pigpen Cryptography 10
Vigenère Cryptography 10
Biology Cryptography 10
On the fence Cryptography 10
SQL Basics 1 Programming 5
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Navajo Cryptography 10
Enigma 1 Cryptography 14
I Thought Linux was Secure! Security 15
Affine Cryptography 15
Alphabetical Disorder Cryptography 15
Mexican Army Wheel Cryptography 15
Enigma 2 Cryptography 16
Pizza Cryptography 20
Music Cryptography 50
Python Basics 1 Programming 10
Query Quest 1 Programming 10
Python Basics 2 Programming 15
Python Basics 4 Programming 20
Python Basics 3 Programming 15
Query Quest 2 Programming 20
SQL Database Programming 30
DVWA Port Programming 60
Career Exploration 1 Grab-Bag 15
Career Exploration 2 Grab-Bag 15
Career Exploration 4 Grab-Bag 15
Password Breach 1 Cybersecurity 10
WannaCry Grab-Bag 10
tcpdump 1 Networking 5
Internet Protocols 1 Networking 5
XOR… It's pretty exclusive Cryptography 20
MAC Addresses 1 Networking 5
MAC Addresses 2 Networking 10
MAC Addresses 3 Networking 15
Query Quest 4 Programming 40
Query Quest 3 Programming 30
Query Quest 5 Programming 40
Stained QR Coding Forensics 50
What do you see? Forensics 10
Password Breach 2 Cybersecurity 15
Password Breach 5 Cybersecurity 3
He Who Shall Not Be Named Steganography 40
No need for 11, 12, or 13 Grab-Bag 5
tcpdump 5 Networking 5
tcpdump 6 Networking 20
tcpdump 4 Networking 15
Internet Protocols 2 Networking 10
Mythical Packets Networking 30
tcpdump 2 Networking 10
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
Busy Traffic 4 Networking 20
Busy Traffic 7 Networking 20
Busy Traffic 3 Networking 30
Locked Forensics 10
Voynich Cryptography 15
Once upon a whimsical noon Forensics 40
Which creek? Forensics 15
Mythical Packets 2 Networking 40
Radiogram Steganography 15
I'm tired… Forensics 10
Busy Traffic 5 Networking 40
Career Exploration 3 Grab-Bag 15
Magic Picture Forensics 30
Rudimentary Java Programming 15
Hexadecimal to Decimal Conversion Programming 5
Octal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Email Scam Cybersecurity 10
Morbit Cipher Cryptography 20
Duckspeak Cipher Cryptography 15
Decryption Cryptography 10
Stereogram Grab-Bag 15
Beaufort Cipher Cryptography 15
All the 8s Programming 15
CYBER.ORG Site Search Steganography 15
ADFGVX Cipher Cryptography 20
Webbot Programming 15
Keep the Pi Grab-Bag 15
Where's Waldo? Steganography 15
Find Him Forensics 10
tcpdump 3 Networking 10
I broke it… Forensics 5
Student Survey Grab-Bag 5
The Hidden Ring Steganography 30
Mythical Packets 3 Networking 50
Busy Traffic 6 Networking 30
More than just green code? Forensics 20
Hide and Seek Forensics 20
Hide and Seek too Forensics 30
SQL Advanced 1 Programming 40
SQL Advanced 2 Programming 40
Password Breach 4 Cybersecurity 15
Winnie the Pooh Steganography 20
Password Breach 7 Cybersecurity 20
Color Swatch Grab-Bag 15