Ctrl + Alt + Fangs

6th place

1458 points


Members

User Name Score
jnx2fye9 138
ghpa8xy 375
f6hcde6t 290
x4rhtxp7 625
uwzy42bc 30

Solves

Challenge Category Value Time
Gain Access 0
Busy Traffic 3 Networking 30
Busy Traffic 2 Networking 20
SQL Basics 1 Programming 5
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Password Breach 1 Cybersecurity 10
Password Breach 2 Cybersecurity 15
Python Basics 1 Programming 10
Python Basics 2 Programming 15
Python Basics 3 Programming 15
DVWA Port Programming 60
Bacon Cryptography 10
Caesar Cryptography 10
Pigpen Cryptography 10
Vigenère Cryptography 10
Busy Traffic 1 Networking 10
Navajo Cryptography 10
Query Quest 1 Programming 10
Pizza Cryptography 20
I Thought Linux was Secure! Security 15
Career Exploration 4 Grab-Bag 15
Career Exploration 2 Grab-Bag 15
Busy Traffic 5 Networking 40
Locked Forensics 10
Stained QR Coding Forensics 50
Enigma 1 Cryptography 14
Enigma 2 Cryptography 16
Atbash Cryptography 10
Affine Cryptography 15
Python Basics 4 Programming 20
Query Quest 2 Programming 20
XOR… It's pretty exclusive Cryptography 20
Mexican Army Wheel Cryptography 15
Query Quest 5 Programming 40
Query Quest 3 Programming 30
Career Exploration 1 Grab-Bag 15
SQL Database Programming 30
Query Quest 4 Programming 40
Busy Traffic 7 Networking 20
Busy Traffic 4 Networking 20
Internet Protocols 1 Networking 5
tcpdump 1 Networking 5
tcpdump 5 Networking 5
MAC Addresses 1 Networking 5
I broke it… Forensics 5
He Who Shall Not Be Named Steganography 40
Biology Cryptography 10
On the fence Cryptography 10
Which creek? Forensics 15
tcpdump 2 Networking 10
I'm tired… Forensics 10
What do you see? Forensics 10
Busy Traffic 6 Networking 30
Password Breach 4 Cybersecurity 15
Password Breach 6 Cybersecurity 15
Password Breach 5 Cybersecurity 3
tcpdump 4 Networking 15
tcpdump 3 Networking 10
Alphabetical Disorder Cryptography 15
tcpdump 6 Networking 20
Magic Picture Forensics 30
MAC Addresses 3 Networking 15
Once upon a whimsical noon Forensics 40
MAC Addresses 2 Networking 10
Hexadecimal to Decimal Conversion Programming 5
Email Scam Cybersecurity 10
Binary to Decimal Conversion Programming 10
Octal to Decimal Conversion Programming 5
Rudimentary Java Programming 15
Duckspeak Cipher Cryptography 15
Morbit Cipher Cryptography 20
Beaufort Cipher Cryptography 15
Find Him Forensics 10
Mythical Packets Networking 30
Stereogram Grab-Bag 15
Radiogram Steganography 15
Internet Protocols 2 Networking 10
Decryption Cryptography 10
The Hidden Ring Steganography 30
Voynich Cryptography 15
Student Survey Grab-Bag 5
ADFGVX Cipher Cryptography 20
CYBER.ORG Site Search Steganography 15
Password Breach 7 Cybersecurity 20
Password Breach 3 Cybersecurity 15
Hide and Seek Forensics 20
Hide and Seek too Forensics 30