Authentic Spyware Security

11th place

1304 points


Members

User Name Score
knpgg8g 0
pcj7vnw 395
w5e29ya 758
zhm8zt 111
svxbpw9 40

Awards


Hint 69

hints

Hint for Password Breach 1

-5


Hint 61

hints

Hint for Hide and Seek

-5


Hint 64

hints

Hint for WannaCry

-4


Solves

Challenge Category Value Time
Gain Access 0
Atbash Cryptography 10
Python Basics 1 Programming 10
Python Basics 2 Programming 15
Pizza Cryptography 20
Python Basics 3 Programming 15
Password Breach 1 Cybersecurity 10
DVWA Port Programming 60
Alphabetical Disorder Cryptography 15
Bacon Cryptography 10
Navajo Cryptography 10
Career Exploration 1 Grab-Bag 15
Career Exploration 2 Grab-Bag 15
Query Quest 1 Programming 10
Caesar Cryptography 10
Query Quest 2 Programming 20
Enigma 2 Cryptography 16
Enigma 1 Cryptography 14
Vigenère Cryptography 10
Pigpen Cryptography 10
I Thought Linux was Secure! Security 15
Career Exploration 4 Grab-Bag 15
Password Breach 5 Cybersecurity 3
I broke it… Forensics 5
Mexican Army Wheel Cryptography 15
Affine Cryptography 15
On the fence Cryptography 10
The Hidden Ring Steganography 30
He Who Shall Not Be Named Steganography 40
SQL Basics 1 Programming 5
SQL Basics 2 Programming 5
Query Quest 3 Programming 30
Query Quest 4 Programming 40
Query Quest 5 Programming 40
Biology Cryptography 10
Stained QR Coding Forensics 50
tcpdump 1 Networking 5
Password Breach 2 Cybersecurity 15
tcpdump 5 Networking 5
Internet Protocols 1 Networking 5
WannaCry Grab-Bag 10
tcpdump 2 Networking 10
Busy Traffic 3 Networking 30
Internet Protocols 2 Networking 10
tcpdump 6 Networking 20
MAC Addresses 1 Networking 5
MAC Addresses 2 Networking 10
MAC Addresses 3 Networking 15
Busy Traffic 4 Networking 20
Locked Forensics 10
tcpdump 4 Networking 15
Radiogram Steganography 15
SQL Basics 3 Programming 10
Python Basics 4 Programming 20
Which creek? Forensics 15
What do you see? Forensics 10
I'm tired… Forensics 10
Voynich Cryptography 15
Busy Traffic 6 Networking 30
No need for 11, 12, or 13 Grab-Bag 5
tcpdump 3 Networking 10
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
War Games Grab-Bag 5
SQL Database Programming 30
Hexadecimal to Decimal Conversion Programming 5
Octal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Rudimentary Java Programming 15
Duckspeak Cipher Cryptography 15
All the 8s Programming 15
Morbit Cipher Cryptography 20
Email Scam Cybersecurity 10
CYBER.ORG Site Search Steganography 15
Where's Waldo? Steganography 15
Stereogram Grab-Bag 15
Find Him Forensics 10
Webbot Programming 15
Decryption Cryptography 10
Beaufort Cipher Cryptography 15
Busy Traffic 7 Networking 20
Music Cryptography 50
Student Survey Grab-Bag 5
Busy Traffic 5 Networking 40