Code Making Monkeys

8th place

1423 points


Members

User Name Score
9xbfxqaxc 229
b8sm3pfcx 120
e2tdgbc 443
e29bjcsr 446
qx8kk4m 185

Awards


Hint 65

hints

Hint for Query Quest 2

-3


Hint 63

hints

Hint for Stained QR Coding

-8


Hint 64

hints

Hint for WannaCry

-4


Hint 61

hints

Hint for Hide and Seek

-5


Solves

Challenge Category Value Time
Gain Access 0
SQL Basics 1 Programming 5
Atbash Cryptography 10
Bacon Cryptography 10
Caesar Cryptography 10
Pigpen Cryptography 10
Vigenère Cryptography 10
On the fence Cryptography 10
Navajo Cryptography 10
Enigma 1 Cryptography 14
Affine Cryptography 15
Alphabetical Disorder Cryptography 15
I broke it… Forensics 5
Pizza Cryptography 20
Enigma 2 Cryptography 16
Mexican Army Wheel Cryptography 15
War Games Grab-Bag 5
DVWA Port Programming 60
I Thought Linux was Secure! Security 15
Password Breach 1 Cybersecurity 10
Radiogram Steganography 15
The Hidden Ring Steganography 30
He Who Shall Not Be Named Steganography 40
Locked Forensics 10
SQL Basics 2 Programming 5
SQL Basics 3 Programming 10
Python Basics 1 Programming 10
Python Basics 2 Programming 15
Biology Cryptography 10
Python Basics 3 Programming 15
Python Basics 4 Programming 20
MAC Addresses 1 Networking 5
Career Exploration 2 Grab-Bag 15
Career Exploration 1 Grab-Bag 15
Career Exploration 4 Grab-Bag 15
Password Breach 2 Cybersecurity 15
Password Breach 3 Cybersecurity 15
Password Breach 5 Cybersecurity 3
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
Query Quest 1 Programming 10
Busy Traffic 3 Networking 30
Busy Traffic 4 Networking 20
Query Quest 2 Programming 20
Query Quest 3 Programming 30
Query Quest 4 Programming 40
Internet Protocols 1 Networking 5
Query Quest 5 Programming 40
Internet Protocols 2 Networking 10
Magic Picture Forensics 30
SQL Database Programming 30
WannaCry Grab-Bag 10
No need for 11, 12, or 13 Grab-Bag 5
Stained QR Coding Forensics 50
Music Cryptography 50
I'm tired… Forensics 10
tcpdump 1 Networking 5
Which creek? Forensics 15
Once upon a whimsical noon Forensics 40
Voynich Cryptography 15
Career Exploration 3 Grab-Bag 15
Hexadecimal to Decimal Conversion Programming 5
Octal to Decimal Conversion Programming 5
Rudimentary Java Programming 15
Stereogram Grab-Bag 15
Email Scam Cybersecurity 10
Webbot Programming 15
Binary to Decimal Conversion Programming 10
Duckspeak Cipher Cryptography 15
Where's Waldo? Steganography 15
Morbit Cipher Cryptography 20
CYBER.ORG Site Search Steganography 15
MAC Addresses 2 Networking 10
Find Him Forensics 10
Decryption Cryptography 10
Beaufort Cipher Cryptography 15
All the 8s Programming 15
tcpdump 5 Networking 5
tcpdump 2 Networking 10
Busy Traffic 7 Networking 20
Hide and Seek Forensics 20
Busy Traffic 6 Networking 30
Hide and Seek too Forensics 30
Busy Traffic 5 Networking 40
Student Survey Grab-Bag 5
tcpdump 6 Networking 20
tcpdump 4 Networking 15
tcpdump 3 Networking 10