Kaythen
Switzerland
48th place
104 points
Solves
Challenge | Category | Value | Time |
---|---|---|---|
[★★★] Suspect tracking - Identification | OSINT | 9 | May 21st, 10:34:36 AM |
[★☆☆] Bastion - The backdoor culprit | Forensics | 9 | May 14th, 5:09:10 AM |
[★☆☆] Bastion - Feel free to dig in | Forensics | 3 | May 13th, 3:51:06 PM |
[★☆☆] Bastion - Clean bastion | Forensics | 3 | May 13th, 3:30:02 PM |
[★☆☆] Bastion - Inspect the file system | Forensics | 3 | May 11th, 10:16:52 AM |
[★☆☆] Bastion - So much just from logs | Forensics | 3 | May 11th, 9:57:22 AM |
[☆☆☆] SanityChecker - Password protected | Malware Analysis and Reverse Engineering | 1 | April 16th, 3:46:23 PM |
[☆☆☆] SanityChecker - Bash dropper | Malware Analysis and Reverse Engineering | 1 | April 16th, 1:53:12 PM |
[☆☆☆] SanityChecker - Sleepy python | Malware Analysis and Reverse Engineering | 1 | April 16th, 1:52:50 PM |
[★★☆] Eugene’s FATigue - Was that the only file? | Forensics | 6 | April 16th, 1:21:42 PM |
[★☆☆] Ransomware - Recovery 2 | Cryptography | 3 | April 16th, 4:49:33 AM |
[☆☆☆] First Contact - Or hack their mainframe... | Forensics | 1 | April 15th, 1:42:37 PM |
[☆☆☆] First Contact - Independence day | Forensics | 1 | April 15th, 1:40:17 PM |
[☆☆☆] First Contact - A Day in the Strife | Forensics | 1 | April 15th, 1:37:49 PM |
[☆☆☆] First Contact - Between 15 and 17 | Forensics | 1 | April 15th, 1:37:29 PM |
[☆☆☆] First Contact - Still fighting | Forensics | 1 | April 15th, 1:31:05 PM |
[☆☆☆] First Contact - So long, but wait, we’re still playing! | Forensics | 1 | April 15th, 1:29:47 PM |
[☆☆☆] First Contact - In competition with jellyfish | Forensics | 1 | April 15th, 1:28:55 PM |
[☆☆☆] First Contact - Hard choices | Forensics | 1 | April 15th, 1:28:05 PM |
[☆☆☆] Advanced Decryption Standard - easy like counting up to three | Cryptography | 1 | April 15th, 4:45:22 AM |
[☆☆☆] Advanced Decryption Standard - Blockchain | Cryptography | 1 | April 15th, 4:41:31 AM |
[☆☆☆] Advanced Decryption Standard - Codebook | Cryptography | 1 | April 15th, 4:31:14 AM |
[★☆☆] ConnectionChecker - Lies | Malware Analysis and Reverse Engineering | 3 | April 10th, 4:54:25 AM |
[★★☆] Equestria - The Dark Ruler | Web Exploitation and Binary Exploitation | 6 | April 8th, 8:34:29 PM |
[★★☆] Eugene’s FATigue - FATigue | Forensics | 6 | April 8th, 4:28:25 AM |
[★★☆] JAILE - User | Web Exploitation and Binary Exploitation | 6 | April 7th, 2:30:55 PM |
[★★☆] Equestria - Shadow Realm | Web Exploitation and Binary Exploitation | 6 | April 6th, 3:38:12 PM |
[★☆☆] Adversary - 3AES | Cryptography | 3 | April 3rd, 4:12:40 PM |
[★★☆] Equestria - Door To The Stable | Web Exploitation and Binary Exploitation | 6 | April 2nd, 6:26:23 PM |
[★★☆] JAILE - Calculator | Web Exploitation and Binary Exploitation | 6 | April 2nd, 10:44:09 AM |
[★☆☆] ConnectionChecker - Tool | Malware Analysis and Reverse Engineering | 3 | April 2nd, 5:13:47 AM |
[★☆☆] Ransomware - Recovery 1 | Cryptography | 3 | April 1st, 5:11:37 PM |
[★☆☆] Adversary - Almost Classic | Cryptography | 3 | April 1st, 12:27:50 PM |
Solves (NaN%)
Fails (NaN%)