344 Jarvis AI

14th place

1237 points


Members

User Name Score
5ggfcc 223
xbsm73vsm 1014
6hq7mpfm 0
s2m2vcp 0
tfskjb9kf 0

Solves

Challenge Category Value Time
Gain Access 0
I broke it… Forensics 5
Caesar Cryptography 10
Bacon Cryptography 10
Vigenère Cryptography 10
Navajo Cryptography 10
On the fence Cryptography 10
I Thought Linux was Secure! Security 15
Locked Forensics 10
Password Breach 1 Cybersecurity 10
SQL Basics 1 Programming 5
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Career Exploration 2 Grab-Bag 15
Mexican Army Wheel Cryptography 15
Enigma 1 Cryptography 14
DVWA Port Programming 60
Career Exploration 4 Grab-Bag 15
Busy Traffic 4 Networking 20
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
Password Breach 2 Cybersecurity 15
Password Breach 5 Cybersecurity 3
MAC Addresses 2 Networking 10
Python Basics 3 Programming 15
Python Basics 4 Programming 20
Query Quest 1 Programming 10
Query Quest 2 Programming 20
Query Quest 3 Programming 30
Query Quest 5 Programming 40
Query Quest 4 Programming 40
Pigpen Cryptography 10
Atbash Cryptography 10
Once upon a whimsical noon Forensics 40
tcpdump 4 Networking 15
tcpdump 1 Networking 5
tcpdump 5 Networking 5
tcpdump 6 Networking 20
tcpdump 3 Networking 10
Internet Protocols 1 Networking 5
He Who Shall Not Be Named Steganography 40
Magic Picture Forensics 30
Career Exploration 1 Grab-Bag 15
Beaufort Cipher Cryptography 15
Octal to Decimal Conversion Programming 5
Hexadecimal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Rudimentary Java Programming 15
Morbit Cipher Cryptography 20
Decryption Cryptography 10
CYBER.ORG Site Search Steganography 15
Webbot Programming 15
Email Scam Cybersecurity 10
Stereogram Grab-Bag 15
Radiogram Steganography 15
Alphabetical Disorder Cryptography 15
Duckspeak Cipher Cryptography 15
Busy Traffic 5 Networking 40
Busy Traffic 3 Networking 30
Biology Cryptography 10
Student Survey Grab-Bag 5
War Games Grab-Bag 5
Career Exploration 3 Grab-Bag 15
Python Basics 2 Programming 15
Python Basics 1 Programming 10
Pizza Cryptography 20
Where's Waldo? Steganography 15
The Hidden Ring Steganography 30
tcpdump 2 Networking 10
Stained QR Coding Forensics 50
Affine Cryptography 15
Busy Traffic 6 Networking 30
MAC Addresses 1 Networking 5
SQL Database Programming 30
Password Breach 3 Cybersecurity 15
Busy Traffic 7 Networking 20