CHS Hackstreet Boys

4th place

1563 points


Members

User Name Score
96z5bz 430
qj7aejm 80
rjrd4b8du 355
h3z3m888 185
23bpyyrg 513

Awards


Hint 61

hints

Hint for Hide and Seek

-5


Solves

Challenge Category Value Time
Gain Access 0
I broke it… Forensics 5
Caesar Cryptography 10
Pizza Cryptography 20
Mexican Army Wheel Cryptography 15
Bacon Cryptography 10
Enigma 1 Cryptography 14
I Thought Linux was Secure! Security 15
SQL Basics 1 Programming 5
DVWA Port Programming 60
On the fence Cryptography 10
Biology Cryptography 10
Pigpen Cryptography 10
Navajo Cryptography 10
Python Basics 3 Programming 15
Vigenère Cryptography 10
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Affine Cryptography 15
Alphabetical Disorder Cryptography 15
War Games Grab-Bag 5
Enigma 2 Cryptography 16
Stained QR Coding Forensics 50
Career Exploration 4 Grab-Bag 15
Which creek? Forensics 15
Busy Traffic 1 Networking 10
Atbash Cryptography 10
Busy Traffic 3 Networking 30
He Who Shall Not Be Named Steganography 40
Busy Traffic 4 Networking 20
Query Quest 1 Programming 10
Query Quest 2 Programming 20
Query Quest 3 Programming 30
Query Quest 4 Programming 40
Query Quest 5 Programming 40
Internet Protocols 1 Networking 5
Internet Protocols 2 Networking 10
Password Breach 1 Cybersecurity 10
Password Breach 2 Cybersecurity 15
Password Breach 5 Cybersecurity 3
Python Basics 1 Programming 10
Python Basics 2 Programming 15
Python Basics 4 Programming 20
tcpdump 3 Networking 10
tcpdump 6 Networking 20
MAC Addresses 1 Networking 5
Busy Traffic 7 Networking 20
Busy Traffic 2 Networking 20
tcpdump 5 Networking 5
tcpdump 4 Networking 15
tcpdump 2 Networking 10
No need for 11, 12, or 13 Grab-Bag 5
Career Exploration 2 Grab-Bag 15
Career Exploration 1 Grab-Bag 15
MAC Addresses 2 Networking 10
MAC Addresses 3 Networking 15
The Hidden Ring Steganography 30
Career Exploration 3 Grab-Bag 15
Busy Traffic 5 Networking 40
I'm tired… Forensics 10
Once upon a whimsical noon Forensics 40
Mythical Packets Networking 30
Mythical Packets 2 Networking 40
Mythical Packets 3 Networking 50
Locked Forensics 10
SQL Database Programming 30
Email Scam Cybersecurity 10
Hexadecimal to Decimal Conversion Programming 5
Octal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Rudimentary Java Programming 15
Duckspeak Cipher Cryptography 15
Morbit Cipher Cryptography 20
CYBER.ORG Site Search Steganography 15
Stereogram Grab-Bag 15
Where's Waldo? Steganography 15
Beaufort Cipher Cryptography 15
Radiogram Steganography 15
Keep the Pi Grab-Bag 15
Stranger Things Steganography 20
All the 8s Programming 15
Webbot Programming 15
Magic Picture Forensics 30
Find Him Forensics 10
Voynich Cryptography 15
Password Breach 3 Cybersecurity 15
Password Breach 4 Cybersecurity 15
Password Breach 6 Cybersecurity 15
Decryption Cryptography 10
Password Breach 7 Cybersecurity 20
Student Survey Grab-Bag 5
Hide and Seek Forensics 20
Hide and Seek too Forensics 30