alexey.collector

7th place

257 points


Solves

Challenge Category Value Time
[★★★] Elliptic - 3 Curves and mysterious story Cryptography 27
[★★★] Elliptic - How to break so many bits? Cryptography 9
[★★★] Elliptic - Simple curve definition Cryptography 9
[☆☆☆] First Contact - Or hack their mainframe... Forensics 1
[☆☆☆] First Contact - Independence day Forensics 1
[☆☆☆] First Contact - A Day in the Strife Forensics 1
[☆☆☆] First Contact - Between 15 and 17 Forensics 1
[☆☆☆] First Contact - Still fighting Forensics 1
[☆☆☆] First Contact - So long, but wait, we’re still playing! Forensics 1
[☆☆☆] First Contact - In competition with jellyfish Forensics 1
[☆☆☆] First Contact - Hard choices Forensics 1
[☆☆☆] SanityChecker - Password protected Malware Analysis and Reverse Engineering 1
[☆☆☆] SanityChecker - Bash dropper Malware Analysis and Reverse Engineering 1
[☆☆☆] SanityChecker - Sleepy python Malware Analysis and Reverse Engineering 1
[☆☆☆] Advanced Decryption Standard - easy like counting up to three Cryptography 1
[☆☆☆] Advanced Decryption Standard - Blockchain Cryptography 1
[☆☆☆] Advanced Decryption Standard - Codebook Cryptography 1
[★★★] Suspect tracking - Golden Hour OSINT 27
[★★★] Suspect tracking - Localization OSINT 9
[★☆☆] Ransomware - Recovery 3 Cryptography 9
[★★★] Suspect tracking - Identification OSINT 9
[★★☆] JAILE - Final Escape Web Exploitation and Binary Exploitation 18
[★☆☆] Ransomware - Recovery 2 Cryptography 3
[★☆☆] Adversary - Key exchange Cryptography 9
[★★☆] JAILE - User Web Exploitation and Binary Exploitation 6
[★☆☆] Adversary - 3AES Cryptography 3
[★★☆] Eugene’s FATigue - Wrapping it up Forensics 18
[★★☆] Eugene’s FATigue - It tastes like a poem Forensics 6
[★★☆] Eugene’s FATigue - Was that the only file? Forensics 6
[★★☆] Eugene’s FATigue - Is that it? Forensics 6
[★★☆] Eugene’s FATigue - FATigue Forensics 6
[★☆☆] Ransomware - Recovery 1 Cryptography 3
[★☆☆] ConnectionChecker - Executer Malware Analysis and Reverse Engineering 9
[★☆☆] ConnectionChecker - Lies Malware Analysis and Reverse Engineering 3
[★☆☆] ConnectionChecker - Tool Malware Analysis and Reverse Engineering 3
[★★☆] JAILE - Calculator Web Exploitation and Binary Exploitation 6
[★☆☆] Adversary - Almost Classic Cryptography 3
[★★☆] Equestria - Final Curse Web Exploitation and Binary Exploitation 18
[★★☆] Equestria - The Dark Ruler Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Shadow Realm Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Door To The Stable Web Exploitation and Binary Exploitation 6