CHS Phish-n-Chips

2nd place

1779 points


Members

User Name Score
x2yd4g7g 630
8yhxpg4y 176
5zf43xph 230
ncac25q9 420
krymvusz 323

Awards


Hint 64

hints

Hint for WannaCry

-4


Hint 61

hints

Hint for Hide and Seek

-5


Solves

Challenge Category Value Time
Gain Access 0
Python Basics 1 Programming 10
Python Basics 2 Programming 15
Magic Picture Forensics 30
Atbash Cryptography 10
Caesar Cryptography 10
Vigenère Cryptography 10
Python Basics 3 Programming 15
Which creek? Forensics 15
Python Basics 4 Programming 20
Navajo Cryptography 10
Alphabetical Disorder Cryptography 15
Bacon Cryptography 10
Pizza Cryptography 20
War Games Grab-Bag 5
I Thought Linux was Secure! Security 15
Password Breach 1 Cybersecurity 10
SQL Basics 1 Programming 5
Mexican Army Wheel Cryptography 15
SQL Basics 2 Programming 5
Career Exploration 1 Grab-Bag 15
Career Exploration 4 Grab-Bag 15
Career Exploration 2 Grab-Bag 15
SQL Basics 3 Programming 10
On the fence Cryptography 10
Affine Cryptography 15
The Hidden Ring Steganography 30
I broke it… Forensics 5
Pigpen Cryptography 10
Biology Cryptography 10
Password Breach 2 Cybersecurity 15
Enigma 1 Cryptography 14
Enigma 2 Cryptography 16
Busy Traffic 1 Networking 10
Busy Traffic 3 Networking 30
Busy Traffic 2 Networking 20
Busy Traffic 4 Networking 20
Stained QR Coding Forensics 50
Query Quest 1 Programming 10
Query Quest 2 Programming 20
Busy Traffic 7 Networking 20
DVWA Port Programming 60
ProgramFault Programming 30
Query Quest 3 Programming 30
Query Quest 4 Programming 40
tcpdump 1 Networking 5
Query Quest 5 Programming 40
tcpdump 5 Networking 5
He Who Shall Not Be Named Steganography 40
Internet Protocols 1 Networking 5
tcpdump 3 Networking 10
tcpdump 2 Networking 10
tcpdump 4 Networking 15
tcpdump 6 Networking 20
Password Breach 3 Cybersecurity 15
Password Breach 4 Cybersecurity 15
Password Breach 5 Cybersecurity 3
Password Breach 6 Cybersecurity 15
Internet Protocols 2 Networking 10
MAC Addresses 3 Networking 15
Password Breach 7 Cybersecurity 20
Password Breach 8 Cybersecurity 30
SQL Database Programming 30
MAC Addresses 2 Networking 10
MAC Addresses 1 Networking 5
Radiogram Steganography 15
Locked Forensics 10
What do you see? Forensics 10
Mythical Packets Networking 30
I'm tired… Forensics 10
Once upon a whimsical noon Forensics 40
Busy Traffic 5 Networking 40
CYBER.ORG Site Search Steganography 15
Duckspeak Cipher Cryptography 15
Stereogram Grab-Bag 15
Hexadecimal to Decimal Conversion Programming 5
Octal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Email Scam Cybersecurity 10
Rudimentary Java Programming 15
Morbit Cipher Cryptography 20
Stranger Things Steganography 20
All the 8s Programming 15
Decryption Cryptography 10
Keep the Pi Grab-Bag 15
Beaufort Cipher Cryptography 15
Webbot Programming 15
Where's Waldo? Steganography 15
Busy Traffic 6 Networking 30
ADFGVX Cipher Cryptography 20
No need for 11, 12, or 13 Grab-Bag 5
Mythical Packets 2 Networking 40
Color Swatch Grab-Bag 15
Mythical Packets 3 Networking 50
Voynich Cryptography 15
Find Him Forensics 10
Career Exploration 3 Grab-Bag 15
More than just green code? Forensics 20
Student Survey Grab-Bag 5
WannaCry Grab-Bag 10
Music Cryptography 50
Hide and Seek Forensics 20
Hide and Seek too Forensics 30