The Hacktivistz

3rd place

1564 points


Members

User Name Score
qatxdf7q 1399
tc8n5fj8b 0
m3yxgv 50
966fcqm8 115
r2dww4j83 0

Awards


Hint 61

hints

Hint for Hide and Seek

-5


Hint 64

hints

Hint for WannaCry

-4


Solves

Challenge Category Value Time
Gain Access 0
I Thought Linux was Secure! Security 15
Python Basics 1 Programming 10
Alphabetical Disorder Cryptography 15
Mexican Army Wheel Cryptography 15
Python Basics 2 Programming 15
Python Basics 3 Programming 15
Biology Cryptography 10
Python Basics 4 Programming 20
I broke it… Forensics 5
Pizza Cryptography 20
Password Breach 1 Cybersecurity 10
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
Atbash Cryptography 10
Bacon Cryptography 10
Busy Traffic 4 Networking 20
Caesar Cryptography 10
SQL Basics 1 Programming 5
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Vigenère Cryptography 10
tcpdump 1 Networking 5
DVWA Port Programming 60
He Who Shall Not Be Named Steganography 40
No need for 11, 12, or 13 Grab-Bag 5
Password Breach 2 Cybersecurity 15
Query Quest 1 Programming 10
Query Quest 2 Programming 20
Query Quest 4 Programming 40
tcpdump 5 Networking 5
Internet Protocols 1 Networking 5
MAC Addresses 1 Networking 5
tcpdump 3 Networking 10
Internet Protocols 2 Networking 10
tcpdump 4 Networking 15
tcpdump 6 Networking 20
On the fence Cryptography 10
Busy Traffic 3 Networking 30
Busy Traffic 5 Networking 40
Navajo Cryptography 10
Busy Traffic 7 Networking 20
Mythical Packets Networking 30
Mythical Packets 2 Networking 40
tcpdump 2 Networking 10
MAC Addresses 2 Networking 10
MAC Addresses 3 Networking 15
Stained QR Coding Forensics 50
War Games Grab-Bag 5
Career Exploration 1 Grab-Bag 15
Career Exploration 2 Grab-Bag 15
Magic Picture Forensics 30
Query Quest 3 Programming 30
Query Quest 5 Programming 40
Enigma 1 Cryptography 14
Enigma 2 Cryptography 16
Affine Cryptography 15
Voynich Cryptography 15
The Hidden Ring Steganography 30
Pigpen Cryptography 10
Locked Forensics 10
Once upon a whimsical noon Forensics 40
Career Exploration 4 Grab-Bag 15
Password Breach 5 Cybersecurity 3
Hexadecimal to Decimal Conversion Programming 5
Octal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Rudimentary Java Programming 15
Decryption Cryptography 10
Stereogram Grab-Bag 15
Webbot Programming 15
All the 8s Programming 15
SQL Database Programming 30
Beaufort Cipher Cryptography 15
Duckspeak Cipher Cryptography 15
Morbit Cipher Cryptography 20
CYBER.ORG Site Search Steganography 15
Email Scam Cybersecurity 10
Password Breach 3 Cybersecurity 15
Password Breach 4 Cybersecurity 15
Password Breach 6 Cybersecurity 15
Password Breach 7 Cybersecurity 20
Password Breach 8 Cybersecurity 30
Stranger Things Steganography 20
Radiogram Steganography 15
I'm tired… Forensics 10
Where's Waldo? Steganography 15
Find Him Forensics 10
What do you see? Forensics 10
Which creek? Forensics 15
Winnie the Pooh Steganography 20
Hide and Seek Forensics 20
Hide and Seek too Forensics 30
WannaCry Grab-Bag 10
Career Exploration 3 Grab-Bag 15