0xfun

2nd place

461 points


Solves

Challenge Category Value Time
[★★★] Meme History Blog - Scratching the surface Web Exploitation and Binary Exploitation 9
[★★★] JAILE3 - MathEmulator Malware Analysis and Reverse Engineering 9
[★☆☆] The Chronicles of Greg 2 - You need stronger glasses Forensics 6
[★☆☆] The Chronicles of Greg 2 - Frustrating compression Forensics 3
[★☆☆] Reading the dusty books - Colors of the rainbow Process and Governance 6
[★☆☆] Reading the dusty books - Handling Process and Governance 3
[★★☆] ByteBusters - Binary Sabotage Web Exploitation and Binary Exploitation 18
[★☆☆] The digital trail - The escape plan OSINT 9
[★☆☆] The digital trail - The private channel OSINT 3
[★☆☆] The digital trail - The digital footprint OSINT 3
[★★☆] ByteBusters - Memory Phantoms Web Exploitation and Binary Exploitation 6
[★★☆] ByteBusters - Secure Shell Web Exploitation and Binary Exploitation 6
[★★☆] ByteBusters - Terminal Magic Web Exploitation and Binary Exploitation 6
[★☆☆] The digital trail - The evidence OSINT 3
[★☆☆] The digital trail - The tip OSINT 3
[★★☆] Short Crypto Tales - SecretFunction^2 Cryptography 18
[★★☆] Short Crypto Tales - Suibom Cryptography 3
[★★☆] Short Crypto Tales - MorizOtis Cryptography 3
[★★☆] The Chronicles of Greg - The Shared Object Prophecy Malware Analysis and Reverse Engineering 18
[★★☆] JAILE2 - Blazing-fast, memory-safe interpreter Web Exploitation and Binary Exploitation 18
[★★☆] JAILE2 - dictFS Web Exploitation and Binary Exploitation 6
[★★☆] The Chronicles of Greg - The Blob Whisperer Malware Analysis and Reverse Engineering 6
[★☆☆] Bastion - The backdoor culprit Forensics 9
[★☆☆] Bastion - Feel free to dig in Forensics 3
[★☆☆] Bastion - Clean bastion Forensics 3
[★★☆] The Chronicles of Greg - SystemUpdate incident report Malware Analysis and Reverse Engineering 6
[★☆☆] Bastion - Inspect the file system Forensics 3
[★☆☆] Bastion - So much just from logs Forensics 3
[★★☆] JAILE2 - The Tasty Bun Web Exploitation and Binary Exploitation 6
[★★☆] JAILE2 - Calculator v2 Web Exploitation and Binary Exploitation 6
[★★☆] JAILE - Final Escape Web Exploitation and Binary Exploitation 18
[★★★] Elliptic - 3 Curves and mysterious story Cryptography 27
[★★★] Elliptic - How to break so many bits? Cryptography 9
[★★☆] Equestria - Final Curse Web Exploitation and Binary Exploitation 18
[★★☆] Eugene’s FATigue - Wrapping it up Forensics 18
[★★☆] Eugene’s FATigue - It tastes like a poem Forensics 6
[★★☆] Equestria - The Dark Ruler Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Shadow Realm Web Exploitation and Binary Exploitation 6
[★★★] Suspect tracking - Golden Hour OSINT 27
[★★★] Suspect tracking - Localization OSINT 9
[☆☆☆] First Contact - Or hack their mainframe... Forensics 1
[☆☆☆] First Contact - Independence day Forensics 1
[☆☆☆] First Contact - A Day in the Strife Forensics 1
[☆☆☆] First Contact - Between 15 and 17 Forensics 1
[☆☆☆] First Contact - Still fighting Forensics 1
[☆☆☆] First Contact - So long, but wait, we’re still playing! Forensics 1
[☆☆☆] First Contact - In competition with jellyfish Forensics 1
[☆☆☆] First Contact - Hard choices Forensics 1
[☆☆☆] SanityChecker - Password protected Malware Analysis and Reverse Engineering 1
[☆☆☆] SanityChecker - Bash dropper Malware Analysis and Reverse Engineering 1
[☆☆☆] SanityChecker - Sleepy python Malware Analysis and Reverse Engineering 1
[☆☆☆] Advanced Decryption Standard - easy like counting up to three Cryptography 1
[☆☆☆] Advanced Decryption Standard - Blockchain Cryptography 1
[☆☆☆] Advanced Decryption Standard - Codebook Cryptography 1
[★★★] Elliptic - Simple curve definition Cryptography 9
[★★★] Suspect tracking - Identification OSINT 9
[★★☆] Equestria - Door To The Stable Web Exploitation and Binary Exploitation 6
[★★☆] Eugene’s FATigue - Was that the only file? Forensics 6
[★★☆] Eugene’s FATigue - Is that it? Forensics 6
[★☆☆] Ransomware - Recovery 3 Cryptography 9
[★☆☆] Ransomware - Recovery 2 Cryptography 3
[★☆☆] Adversary - Key exchange Cryptography 9
[★☆☆] ConnectionChecker - Executer Malware Analysis and Reverse Engineering 9
[★☆☆] Adversary - 3AES Cryptography 3
[★☆☆] ConnectionChecker - Lies Malware Analysis and Reverse Engineering 3
[★☆☆] ConnectionChecker - Tool Malware Analysis and Reverse Engineering 3
[★☆☆] Ransomware - Recovery 1 Cryptography 3
[★★☆] JAILE - User Web Exploitation and Binary Exploitation 6
[★★☆] JAILE - Calculator Web Exploitation and Binary Exploitation 6
[★★☆] Eugene’s FATigue - FATigue Forensics 6
[★☆☆] Adversary - Almost Classic Cryptography 3