Cyberiii
20th place
603 points
Awards
Hint 61
hints
Hint for Hide and Seek
-5
Hint 63
hints
Hint for Stained QR Coding
-8
Hint 69
hints
Hint for Password Breach 1
-5
Hint 65
hints
Hint for Query Quest 2
-3
Hint 64
hints
Hint for WannaCry
-4
Solves
Challenge | Category | Value | Time |
Gain Access | 0 | ||
Bacon | Cryptography | 10 | |
Caesar | Cryptography | 10 | |
Vigenère | Cryptography | 10 | |
I Thought Linux was Secure! | Security | 15 | |
Career Exploration 2 | Grab-Bag | 15 | |
War Games | Grab-Bag | 5 | |
Pizza | Cryptography | 20 | |
Mexican Army Wheel | Cryptography | 15 | |
Which creek? | Forensics | 15 | |
Navajo | Cryptography | 10 | |
SQL Basics 1 | Programming | 5 | |
SQL Basics 2 | Programming | 5 | |
DVWA Port | Programming | 60 | |
Alphabetical Disorder | Cryptography | 15 | |
The Hidden Ring | Steganography | 30 | |
tcpdump 5 | Networking | 5 | |
I broke it… | Forensics | 5 | |
Password Breach 1 | Cybersecurity | 10 | |
Password Breach 5 | Cybersecurity | 3 | |
Password Breach 2 | Cybersecurity | 15 | |
Password Breach 3 | Cybersecurity | 15 | |
MAC Addresses 1 | Networking | 5 | |
Atbash | Cryptography | 10 | |
On the fence | Cryptography | 10 | |
Query Quest 2 | Programming | 20 | |
Query Quest 4 | Programming | 40 | |
Query Quest 5 | Programming | 40 | |
Query Quest 3 | Programming | 30 | |
Pigpen | Cryptography | 10 | |
tcpdump 1 | Networking | 5 | |
WannaCry | Grab-Bag | 10 | |
Internet Protocols 1 | Networking | 5 | |
Career Exploration 1 | Grab-Bag | 15 | |
Email Scam | Cybersecurity | 10 | |
Hexadecimal to Decimal Conversion | Programming | 5 | |
Octal to Decimal Conversion | Programming | 5 | |
Rudimentary Java | Programming | 15 | |
Duckspeak Cipher | Cryptography | 15 | |
Morbit Cipher | Cryptography | 20 | |
Biology | Cryptography | 10 | |
Beaufort Cipher | Cryptography | 15 | |
Binary to Decimal Conversion | Programming | 10 | |
Magic Picture | Forensics | 30 |