Schnibbledorfs

7th place

1428 points


Members

User Name Score
7nvy82uw 0
z9ypggjgt 757
4usf2kc 355
vhmxnnq5 316
5v4gjw6mn 0

Awards


Hint 63

hints

Hint for Stained QR Coding

-8


Hint 64

hints

Hint for WannaCry

-4


Hint 65

hints

Hint for Query Quest 2

-3


Hint 61

hints

Hint for Hide and Seek

-5


Solves

Challenge Category Value Time
Gain Access 0
Atbash Cryptography 10
tcpdump 1 Networking 5
DVWA Port Programming 60
Python Basics 1 Programming 10
tcpdump 2 Networking 10
tcpdump 3 Networking 10
Python Basics 2 Programming 15
tcpdump 4 Networking 15
Bacon Cryptography 10
Caesar Cryptography 10
tcpdump 6 Networking 20
Pigpen Cryptography 10
Vigenère Cryptography 10
Python Basics 3 Programming 15
Python Basics 4 Programming 20
SQL Basics 1 Programming 5
SQL Basics 3 Programming 10
Alphabetical Disorder Cryptography 15
Magic Picture Forensics 30
The Hidden Ring Steganography 30
Career Exploration 2 Grab-Bag 15
He Who Shall Not Be Named Steganography 40
Career Exploration 1 Grab-Bag 15
I Thought Linux was Secure! Security 15
Pizza Cryptography 20
Affine Cryptography 15
Voynich Cryptography 15
Mexican Army Wheel Cryptography 15
On the fence Cryptography 10
Biology Cryptography 10
SQL Basics 2 Programming 5
Navajo Cryptography 10
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
Stained QR Coding Forensics 50
Busy Traffic 3 Networking 30
Busy Traffic 4 Networking 20
Busy Traffic 7 Networking 20
Mythical Packets Networking 30
Locked Forensics 10
WannaCry Grab-Bag 10
Enigma 1 Cryptography 14
Enigma 2 Cryptography 16
MAC Addresses 1 Networking 5
MAC Addresses 2 Networking 10
Mythical Packets 2 Networking 40
Mythical Packets 3 Networking 50
Query Quest 1 Programming 10
Query Quest 2 Programming 20
Internet Protocols 1 Networking 5
XOR… It's pretty exclusive Cryptography 20
Query Quest 3 Programming 30
Query Quest 4 Programming 40
Query Quest 5 Programming 40
Busy Traffic 5 Networking 40
I broke it… Forensics 5
Career Exploration 4 Grab-Bag 15
Career Exploration 3 Grab-Bag 15
SQL Database Programming 30
Password Breach 1 Cybersecurity 10
Password Breach 5 Cybersecurity 3
Internet Protocols 2 Networking 10
Password Breach 2 Cybersecurity 15
Password Breach 3 Cybersecurity 15
Once upon a whimsical noon Forensics 40
Which creek? Forensics 15
Rudimentary Java Programming 15
Hexadecimal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Octal to Decimal Conversion Programming 5
Duckspeak Cipher Cryptography 15
Morbit Cipher Cryptography 20
Decryption Cryptography 10
Email Scam Cybersecurity 10
Where's Waldo? Steganography 15
Webbot Programming 15
CYBER.ORG Site Search Steganography 15
Beaufort Cipher Cryptography 15
All the 8s Programming 15
More than just green code? Forensics 20
Student Survey Grab-Bag 5
Stereogram Grab-Bag 15
Radiogram Steganography 15
I'm tired… Forensics 10