Longmatys

3rd place

344 points


Solves

Challenge Category Value Time
[★★☆] The Chronicles of Greg - The Shared Object Prophecy Malware Analysis and Reverse Engineering 18
[★★☆] The Chronicles of Greg - The Blob Whisperer Malware Analysis and Reverse Engineering 6
[★★☆] The Chronicles of Greg - SystemUpdate incident report Malware Analysis and Reverse Engineering 6
[★☆☆] Bastion - The backdoor culprit Forensics 9
[★☆☆] Bastion - Feel free to dig in Forensics 3
[★☆☆] Bastion - Clean bastion Forensics 3
[★☆☆] Bastion - Inspect the file system Forensics 3
[★☆☆] Bastion - So much just from logs Forensics 3
[☆☆☆] First Contact - Or hack their mainframe... Forensics 1
[☆☆☆] First Contact - Independence day Forensics 1
[☆☆☆] First Contact - A Day in the Strife Forensics 1
[☆☆☆] First Contact - Between 15 and 17 Forensics 1
[☆☆☆] First Contact - Still fighting Forensics 1
[☆☆☆] First Contact - So long, but wait, we’re still playing! Forensics 1
[☆☆☆] First Contact - In competition with jellyfish Forensics 1
[☆☆☆] First Contact - Hard choices Forensics 1
[★★☆] JAILE2 - Blazing-fast, memory-safe interpreter Web Exploitation and Binary Exploitation 18
[★★☆] JAILE2 - dictFS Web Exploitation and Binary Exploitation 6
[★★☆] JAILE2 - The Tasty Bun Web Exploitation and Binary Exploitation 6
[★★☆] JAILE2 - Calculator v2 Web Exploitation and Binary Exploitation 6
[★★★] Elliptic - 3 Curves and mysterious story Cryptography 27
[★★★] Elliptic - How to break so many bits? Cryptography 9
[★★★] Elliptic - Simple curve definition Cryptography 9
[☆☆☆] SanityChecker - Password protected Malware Analysis and Reverse Engineering 1
[☆☆☆] SanityChecker - Bash dropper Malware Analysis and Reverse Engineering 1
[☆☆☆] SanityChecker - Sleepy python Malware Analysis and Reverse Engineering 1
[☆☆☆] Advanced Decryption Standard - easy like counting up to three Cryptography 1
[☆☆☆] Advanced Decryption Standard - Blockchain Cryptography 1
[☆☆☆] Advanced Decryption Standard - Codebook Cryptography 1
[★★☆] Equestria - Final Curse Web Exploitation and Binary Exploitation 18
[★★☆] JAILE - Final Escape Web Exploitation and Binary Exploitation 18
[★☆☆] Ransomware - Recovery 3 Cryptography 9
[★★☆] JAILE - User Web Exploitation and Binary Exploitation 6
[★★☆] Eugene’s FATigue - Wrapping it up Forensics 18
[★★☆] Eugene’s FATigue - It tastes like a poem Forensics 6
[★☆☆] ConnectionChecker - Executer Malware Analysis and Reverse Engineering 9
[★☆☆] ConnectionChecker - Lies Malware Analysis and Reverse Engineering 3
[★☆☆] ConnectionChecker - Tool Malware Analysis and Reverse Engineering 3
[★★☆] Eugene’s FATigue - Was that the only file? Forensics 6
[★★☆] Eugene’s FATigue - Is that it? Forensics 6
[★★☆] Eugene’s FATigue - FATigue Forensics 6
[★★★] Suspect tracking - Golden Hour OSINT 27
[★★★] Suspect tracking - Localization OSINT 9
[★★★] Suspect tracking - Identification OSINT 9
[★★☆] Equestria - The Dark Ruler Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Shadow Realm Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Door To The Stable Web Exploitation and Binary Exploitation 6
[★☆☆] Ransomware - Recovery 2 Cryptography 3
[★☆☆] Ransomware - Recovery 1 Cryptography 3
[★☆☆] Adversary - Key exchange Cryptography 9
[★☆☆] Adversary - 3AES Cryptography 3
[★★☆] JAILE - Calculator Web Exploitation and Binary Exploitation 6
[★☆☆] Adversary - Almost Classic Cryptography 3