Pirates

9th place

1333 points


Members

User Name Score
25drjua 840
fyr42s8j 468
qhrns6396 25
vbqcrq 0
amwby73 0

Solves

Challenge Category Value Time
Gain Access 0
Atbash Cryptography 10
SQL Basics 1 Programming 5
Bacon Cryptography 10
Caesar Cryptography 10
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Vigenère Cryptography 10
Biology Cryptography 10
On the fence Cryptography 10
Navajo Cryptography 10
I broke it… Forensics 5
I'm tired… Forensics 10
Alphabetical Disorder Cryptography 15
Mexican Army Wheel Cryptography 15
Pizza Cryptography 20
I Thought Linux was Secure! Security 15
tcpdump 1 Networking 5
tcpdump 5 Networking 5
tcpdump 3 Networking 10
tcpdump 4 Networking 15
Busy Traffic 1 Networking 10
tcpdump 6 Networking 20
Busy Traffic 2 Networking 20
Busy Traffic 4 Networking 20
Busy Traffic 3 Networking 30
Python Basics 2 Programming 15
Python Basics 3 Programming 15
Python Basics 1 Programming 10
Python Basics 4 Programming 20
DVWA Port Programming 60
Query Quest 1 Programming 10
Query Quest 2 Programming 20
MAC Addresses 1 Networking 5
SQL Database Programming 30
Query Quest 3 Programming 30
MAC Addresses 2 Networking 10
Stained QR Coding Forensics 50
MAC Addresses 3 Networking 15
Career Exploration 2 Grab-Bag 15
Query Quest 4 Programming 40
Query Quest 5 Programming 40
Career Exploration 4 Grab-Bag 15
Password Breach 1 Cybersecurity 10
Password Breach 2 Cybersecurity 15
Password Breach 5 Cybersecurity 3
tcpdump 2 Networking 10
He Who Shall Not Be Named Steganography 40
Mythical Packets Networking 30
Pigpen Cryptography 10
Mythical Packets 2 Networking 40
Internet Protocols 1 Networking 5
Affine Cryptography 15
Enigma 1 Cryptography 14
Enigma 2 Cryptography 16
Radiogram Steganography 15
The Hidden Ring Steganography 30
Password Breach 4 Cybersecurity 15
Password Breach 6 Cybersecurity 15
Password Breach 7 Cybersecurity 20
No need for 11, 12, or 13 Grab-Bag 5
Password Breach 3 Cybersecurity 15
Which creek? Forensics 15
Locked Forensics 10
Once upon a whimsical noon Forensics 40
Internet Protocols 2 Networking 10
Career Exploration 1 Grab-Bag 15
Busy Traffic 5 Networking 40
Hexadecimal to Decimal Conversion Programming 5
Octal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Rudimentary Java Programming 15
Beaufort Cipher Cryptography 15
Duckspeak Cipher Cryptography 15
Morbit Cipher Cryptography 20
Webbot Programming 15
Email Scam Cybersecurity 10
All the 8s Programming 15
Busy Traffic 7 Networking 20
CYBER.ORG Site Search Steganography 15
Stereogram Grab-Bag 15