Atbash
|
Cryptography |
10 |
|
Alphabetical Disorder
|
Cryptography |
15 |
|
Bacon
|
Cryptography |
10 |
|
Caesar
|
Cryptography |
10 |
|
SQL Basics 1
|
Programming |
5 |
|
I broke it…
|
Forensics |
5 |
|
The Hidden Ring
|
Steganography |
30 |
|
He Who Shall Not Be Named
|
Steganography |
40 |
|
DVWA Port
|
Programming |
60 |
|
Biology
|
Cryptography |
10 |
|
WannaCry
|
Grab-Bag |
10 |
|
Busy Traffic 3
|
Networking |
30 |
|
I Thought Linux was Secure!
|
Security |
15 |
|
Busy Traffic 4
|
Networking |
20 |
|
Locked
|
Forensics |
10 |
|
Radiogram
|
Steganography |
15 |
|
What do you see?
|
Forensics |
10 |
|
Which creek?
|
Forensics |
15 |
|
Busy Traffic 6
|
Networking |
30 |
|
No need for 11, 12, or 13
|
Grab-Bag |
5 |
|
War Games
|
Grab-Bag |
5 |
|
Hexadecimal to Decimal Conversion
|
Programming |
5 |
|
Where's Waldo?
|
Steganography |
15 |
|
Find Him
|
Forensics |
10 |
|
Webbot
|
Programming |
15 |
|
Music
|
Cryptography |
50 |
|
Busy Traffic 5
|
Networking |
40 |
|
Student Survey
|
Grab-Bag |
5 |
|