w5e29ya

Authentic Spyware Security

11th place

1304 points


Awards


Solves

Challenge Category Value Time
Atbash Cryptography 10
Alphabetical Disorder Cryptography 15
Bacon Cryptography 10
Navajo Cryptography 10
Career Exploration 2 Grab-Bag 15
Caesar Cryptography 10
Enigma 2 Cryptography 16
Enigma 1 Cryptography 14
Vigenère Cryptography 10
Pigpen Cryptography 10
Career Exploration 4 Grab-Bag 15
Password Breach 5 Cybersecurity 3
Mexican Army Wheel Cryptography 15
Affine Cryptography 15
On the fence Cryptography 10
The Hidden Ring Steganography 30
He Who Shall Not Be Named Steganography 40
SQL Basics 2 Programming 5
Biology Cryptography 10
Stained QR Coding Forensics 50
Busy Traffic 3 Networking 30
MAC Addresses 3 Networking 15
Busy Traffic 4 Networking 20
Locked Forensics 10
tcpdump 4 Networking 15
Radiogram Steganography 15
SQL Basics 3 Programming 10
What do you see? Forensics 10
Voynich Cryptography 15
Busy Traffic 6 Networking 30
tcpdump 3 Networking 10
Busy Traffic 1 Networking 10
Busy Traffic 2 Networking 20
SQL Database Programming 30
Duckspeak Cipher Cryptography 15
Morbit Cipher Cryptography 20
Stereogram Grab-Bag 15
Webbot Programming 15
Decryption Cryptography 10
Beaufort Cipher Cryptography 15
Busy Traffic 7 Networking 20
Music Cryptography 50
Student Survey Grab-Bag 5
Busy Traffic 5 Networking 40