@GR007

9th place

312 points


Solves

Challenge Category Value Time
[★☆☆] The Chronicles of Greg 2 - Frustrating compression Forensics 3
[★☆☆] Reading the dusty books - Colors of the rainbow Process and Governance 6
[★☆☆] Reading the dusty books - Handling Process and Governance 3
[★★☆] Short Crypto Tales - SecretFunction^2 Cryptography 18
[★★☆] Short Crypto Tales - Suibom Cryptography 3
[★★☆] Short Crypto Tales - MorizOtis Cryptography 3
[★☆☆] The digital trail - The escape plan OSINT 9
[★☆☆] The digital trail - The private channel OSINT 3
[★☆☆] The digital trail - The digital footprint OSINT 3
[★★☆] The Chronicles of Greg - The Blob Whisperer Malware Analysis and Reverse Engineering 6
[★☆☆] The digital trail - The evidence OSINT 3
[★★☆] JAILE2 - The Tasty Bun Web Exploitation and Binary Exploitation 6
[★☆☆] The digital trail - The tip OSINT 3
[★★★] Elliptic - 3 Curves and mysterious story Cryptography 27
[★★★] Elliptic - How to break so many bits? Cryptography 9
[★★☆] JAILE2 - Calculator v2 Web Exploitation and Binary Exploitation 6
[★★☆] The Chronicles of Greg - SystemUpdate incident report Malware Analysis and Reverse Engineering 6
[★★☆] Equestria - Final Curse Web Exploitation and Binary Exploitation 18
[★☆☆] Bastion - The backdoor culprit Forensics 9
[★☆☆] Bastion - Feel free to dig in Forensics 3
[★☆☆] Bastion - Clean bastion Forensics 3
[★☆☆] Bastion - Inspect the file system Forensics 3
[★☆☆] Bastion - So much just from logs Forensics 3
[★★☆] Eugene’s FATigue - Is that it? Forensics 6
[★★☆] JAILE - Final Escape Web Exploitation and Binary Exploitation 18
[★★☆] Eugene’s FATigue - It tastes like a poem Forensics 6
[★☆☆] ConnectionChecker - Executer Malware Analysis and Reverse Engineering 9
[★★☆] Equestria - The Dark Ruler Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Shadow Realm Web Exploitation and Binary Exploitation 6
[★☆☆] Ransomware - Recovery 3 Cryptography 9
[★☆☆] Ransomware - Recovery 2 Cryptography 3
[★☆☆] Ransomware - Recovery 1 Cryptography 3
[★☆☆] ConnectionChecker - Lies Malware Analysis and Reverse Engineering 3
[★☆☆] ConnectionChecker - Tool Malware Analysis and Reverse Engineering 3
[★★☆] Eugene’s FATigue - Was that the only file? Forensics 6
[★★☆] Eugene’s FATigue - FATigue Forensics 6
[★★★] Suspect tracking - Golden Hour OSINT 27
[★★★] Suspect tracking - Localization OSINT 9
[★★★] Suspect tracking - Identification OSINT 9
[★★☆] Equestria - Door To The Stable Web Exploitation and Binary Exploitation 6
[★★☆] JAILE - User Web Exploitation and Binary Exploitation 6
[★★☆] JAILE - Calculator Web Exploitation and Binary Exploitation 6
[★★★] Elliptic - Simple curve definition Cryptography 9