Awards
Solves
Challenge | Category | Value | Time |
Atbash | Cryptography | 10 | |
Alphabetical Disorder | Cryptography | 15 | |
Bacon | Cryptography | 10 | |
Navajo | Cryptography | 10 | |
Career Exploration 2 | Grab-Bag | 15 | |
Caesar | Cryptography | 10 | |
Enigma 2 | Cryptography | 16 | |
Enigma 1 | Cryptography | 14 | |
Vigenère | Cryptography | 10 | |
Pigpen | Cryptography | 10 | |
Career Exploration 4 | Grab-Bag | 15 | |
Password Breach 5 | Cybersecurity | 3 | |
Mexican Army Wheel | Cryptography | 15 | |
Affine | Cryptography | 15 | |
On the fence | Cryptography | 10 | |
The Hidden Ring | Steganography | 30 | |
He Who Shall Not Be Named | Steganography | 40 | |
SQL Basics 2 | Programming | 5 | |
Biology | Cryptography | 10 | |
Stained QR Coding | Forensics | 50 | |
Busy Traffic 3 | Networking | 30 | |
MAC Addresses 3 | Networking | 15 | |
Busy Traffic 4 | Networking | 20 | |
Locked | Forensics | 10 | |
tcpdump 4 | Networking | 15 | |
Radiogram | Steganography | 15 | |
SQL Basics 3 | Programming | 10 | |
What do you see? | Forensics | 10 | |
Voynich | Cryptography | 15 | |
Busy Traffic 6 | Networking | 30 | |
tcpdump 3 | Networking | 10 | |
Busy Traffic 1 | Networking | 10 | |
Busy Traffic 2 | Networking | 20 | |
SQL Database | Programming | 30 | |
Duckspeak Cipher | Cryptography | 15 | |
Morbit Cipher | Cryptography | 20 | |
Stereogram | Grab-Bag | 15 | |
Webbot | Programming | 15 | |
Decryption | Cryptography | 10 | |
Beaufort Cipher | Cryptography | 15 | |
Busy Traffic 7 | Networking | 20 | |
Music | Cryptography | 50 | |
Student Survey | Grab-Bag | 5 | |
Busy Traffic 5 | Networking | 40 |