Kale's Kingdom

16th place

1164 points


Members

User Name Score
2m2h9k 345
72q34szs 0
qpjqem4c 0
auzbujym 609
mfdz9x 210

Awards


Hint 64

hints

Hint for WannaCry

-4


Hint 69

hints

Hint for Password Breach 1

-5


Hint 61

hints

Hint for Hide and Seek

-5


Solves

Challenge Category Value Time
Gain Access 0
Atbash Cryptography 10
Bacon Cryptography 10
Caesar Cryptography 10
On the fence Cryptography 10
Pizza Cryptography 20
Mexican Army Wheel Cryptography 15
Career Exploration 4 Grab-Bag 15
WannaCry Grab-Bag 10
SQL Basics 1 Programming 5
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Python Basics 2 Programming 15
Python Basics 3 Programming 15
Python Basics 4 Programming 20
Alphabetical Disorder Cryptography 15
DVWA Port Programming 60
Password Breach 1 Cybersecurity 10
Password Breach 2 Cybersecurity 15
War Games Grab-Bag 5
Biology Cryptography 10
Navajo Cryptography 10
Password Breach 5 Cybersecurity 3
Radiogram Steganography 15
Internet Protocols 1 Networking 5
Python Basics 1 Programming 10
Query Quest 1 Programming 10
Locked Forensics 10
Query Quest 4 Programming 40
Query Quest 2 Programming 20
Vigenère Cryptography 10
Query Quest 5 Programming 40
Pigpen Cryptography 10
Query Quest 3 Programming 30
Enigma 2 Cryptography 16
Enigma 1 Cryptography 14
SQL Database Programming 30
The Hidden Ring Steganography 30
He Who Shall Not Be Named Steganography 40
Busy Traffic 1 Networking 10
Busy Traffic 3 Networking 30
Career Exploration 1 Grab-Bag 15
Career Exploration 2 Grab-Bag 15
Once upon a whimsical noon Forensics 40
No need for 11, 12, or 13 Grab-Bag 5
Which creek? Forensics 15
Stained QR Coding Forensics 50
Affine Cryptography 15
I Thought Linux was Secure! Security 15
Career Exploration 3 Grab-Bag 15
tcpdump 1 Networking 5
Hexadecimal to Decimal Conversion Programming 5
Duckspeak Cipher Cryptography 15
Beaufort Cipher Cryptography 15
Morbit Cipher Cryptography 20
Where's Waldo? Steganography 15
Octal to Decimal Conversion Programming 5
Binary to Decimal Conversion Programming 10
Rudimentary Java Programming 15
Email Scam Cybersecurity 10
Webbot Programming 15
Decryption Cryptography 10
CYBER.ORG Site Search Steganography 15
Stereogram Grab-Bag 15
Find Him Forensics 10
Password Breach 6 Cybersecurity 15
Internet Protocols 2 Networking 10
Magic Picture Forensics 30
MAC Addresses 1 Networking 5
MAC Addresses 2 Networking 10
Student Survey Grab-Bag 5
Music Cryptography 50
tcpdump 6 Networking 20