RoughRiders

5th place

1508 points


Members

User Name Score
fyx7c635 598
ps4rxtg 220
ekxfa7 280
e2mu6vf2 190
sux7j743 220

Solves

Challenge Category Value Time
Gain Access 0
Atbash Cryptography 10
SQL Basics 2 Programming 5
SQL Basics 1 Programming 5
SQL Basics 3 Programming 10
I broke it… Forensics 5
Python Basics 1 Programming 10
Caesar Cryptography 10
Navajo Cryptography 10
Query Quest 1 Programming 10
Python Basics 2 Programming 15
Python Basics 3 Programming 15
Bacon Cryptography 10
Career Exploration 2 Grab-Bag 15
Query Quest 2 Programming 20
Pizza Cryptography 20
Vigenère Cryptography 10
Biology Cryptography 10
I Thought Linux was Secure! Security 15
On the fence Cryptography 10
Alphabetical Disorder Cryptography 15
Mexican Army Wheel Cryptography 15
Locked Forensics 10
Which creek? Forensics 15
The Hidden Ring Steganography 30
MAC Addresses 2 Networking 10
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
He Who Shall Not Be Named Steganography 40
Busy Traffic 4 Networking 20
Busy Traffic 3 Networking 30
Busy Traffic 6 Networking 30
MAC Addresses 1 Networking 5
tcpdump 1 Networking 5
Once upon a whimsical noon Forensics 40
tcpdump 3 Networking 10
tcpdump 4 Networking 15
tcpdump 6 Networking 20
Magic Picture Forensics 30
Stained QR Coding Forensics 50
Career Exploration 4 Grab-Bag 15
Password Breach 1 Cybersecurity 10
Pigpen Cryptography 10
Enigma 1 Cryptography 14
Enigma 2 Cryptography 16
Password Breach 5 Cybersecurity 3
Affine Cryptography 15
I'm tired… Forensics 10
Query Quest 5 Programming 40
Password Breach 2 Cybersecurity 15
DVWA Port Programming 60
Internet Protocols 1 Networking 5
Internet Protocols 2 Networking 10
War Games Grab-Bag 5
WannaCry Grab-Bag 10
What do you see? Forensics 10
Career Exploration 1 Grab-Bag 15
Career Exploration 3 Grab-Bag 15
Query Quest 4 Programming 40
Query Quest 3 Programming 30
Busy Traffic 7 Networking 20
Hide and Seek Forensics 20
Python Basics 4 Programming 20
SQL Advanced 1 Programming 40
SQL Advanced 2 Programming 40
SQL Database Programming 30
tcpdump 5 Networking 5
tcpdump 2 Networking 10
Busy Traffic 5 Networking 40
Password Breach 4 Cybersecurity 15
Password Breach 6 Cybersecurity 15
Password Breach 7 Cybersecurity 20
Password Breach 8 Cybersecurity 30
Password Breach 3 Cybersecurity 15
Rudimentary Java Programming 15
Octal to Decimal Conversion Programming 5
All the 8s Programming 15
Webbot Programming 15
Duckspeak Cipher Cryptography 15
Binary to Decimal Conversion Programming 10
Hexadecimal to Decimal Conversion Programming 5
Morbit Cipher Cryptography 20
Email Scam Cybersecurity 10
Decryption Cryptography 10
Where's Waldo? Steganography 15
CYBER.ORG Site Search Steganography 15
XOR… It's pretty exclusive Cryptography 20
Beaufort Cipher Cryptography 15
Student Survey Grab-Bag 5
Stereogram Grab-Bag 15