AstroViking
11th place
239 points
Solves
Challenge | Category | Value | Time |
---|---|---|---|
[★★☆] Short Crypto Tales - SecretFunction^2 | Cryptography | 18 | May 21st, 10:19:36 PM |
[★★☆] Short Crypto Tales - Suibom | Cryptography | 3 | May 21st, 9:10:38 PM |
[★★☆] Short Crypto Tales - MorizOtis | Cryptography | 3 | May 21st, 8:56:02 PM |
[★★☆] The Chronicles of Greg - The Shared Object Prophecy | Malware Analysis and Reverse Engineering | 18 | May 20th, 9:32:25 PM |
[★★★] Suspect tracking - Localization | OSINT | 9 | May 17th, 5:09:24 PM |
[★★★] Suspect tracking - Identification | OSINT | 9 | May 17th, 1:03:50 AM |
[★☆☆] Bastion - The backdoor culprit | Forensics | 9 | May 17th, 12:16:38 AM |
[★★☆] The Chronicles of Greg - The Blob Whisperer | Malware Analysis and Reverse Engineering | 6 | May 16th, 10:19:09 PM |
[★★☆] The Chronicles of Greg - SystemUpdate incident report | Malware Analysis and Reverse Engineering | 6 | May 16th, 10:43:15 AM |
[★☆☆] Bastion - Feel free to dig in | Forensics | 3 | May 14th, 6:24:41 PM |
[★☆☆] Bastion - Clean bastion | Forensics | 3 | May 14th, 6:10:32 PM |
[★☆☆] Bastion - Inspect the file system | Forensics | 3 | May 12th, 8:52:11 AM |
[★☆☆] Bastion - So much just from logs | Forensics | 3 | May 12th, 8:45:41 AM |
[★★☆] Eugene’s FATigue - Was that the only file? | Forensics | 6 | April 27th, 3:38:44 PM |
[☆☆☆] First Contact - Or hack their mainframe... | Forensics | 1 | April 27th, 3:07:51 PM |
[☆☆☆] First Contact - Independence day | Forensics | 1 | April 27th, 3:05:57 PM |
[☆☆☆] First Contact - A Day in the Strife | Forensics | 1 | April 27th, 3:04:19 PM |
[☆☆☆] First Contact - Between 15 and 17 | Forensics | 1 | April 27th, 3:03:59 PM |
[☆☆☆] First Contact - Still fighting | Forensics | 1 | April 27th, 3:03:28 PM |
[☆☆☆] First Contact - So long, but wait, we’re still playing! | Forensics | 1 | April 27th, 3:02:38 PM |
[☆☆☆] First Contact - In competition with jellyfish | Forensics | 1 | April 27th, 3:01:58 PM |
[☆☆☆] First Contact - Hard choices | Forensics | 1 | April 27th, 3:00:36 PM |
[☆☆☆] SanityChecker - Password protected | Malware Analysis and Reverse Engineering | 1 | April 27th, 2:38:55 PM |
[☆☆☆] SanityChecker - Bash dropper | Malware Analysis and Reverse Engineering | 1 | April 27th, 2:25:36 PM |
[☆☆☆] SanityChecker - Sleepy python | Malware Analysis and Reverse Engineering | 1 | April 27th, 2:24:56 PM |
[★☆☆] Ransomware - Recovery 3 | Cryptography | 9 | April 27th, 2:18:25 PM |
[★★★] Elliptic - Simple curve definition | Cryptography | 9 | April 27th, 1:53:40 PM |
[☆☆☆] Advanced Decryption Standard - easy like counting up to three | Cryptography | 1 | April 27th, 1:31:45 PM |
[☆☆☆] Advanced Decryption Standard - Blockchain | Cryptography | 1 | April 27th, 1:19:36 PM |
[☆☆☆] Advanced Decryption Standard - Codebook | Cryptography | 1 | April 27th, 1:18:11 PM |
[★☆☆] Adversary - Key exchange | Cryptography | 9 | April 9th, 11:02:31 PM |
[★☆☆] ConnectionChecker - Executer | Malware Analysis and Reverse Engineering | 9 | April 8th, 10:59:13 PM |
[★☆☆] ConnectionChecker - Lies | Malware Analysis and Reverse Engineering | 3 | April 7th, 9:12:28 PM |
[★☆☆] ConnectionChecker - Tool | Malware Analysis and Reverse Engineering | 3 | April 7th, 9:05:16 PM |
[★★☆] JAILE - Final Escape | Web Exploitation and Binary Exploitation | 18 | April 7th, 8:51:43 PM |
[★★☆] Equestria - Final Curse | Web Exploitation and Binary Exploitation | 18 | April 6th, 10:31:18 PM |
[★★☆] Eugene’s FATigue - FATigue | Forensics | 6 | April 6th, 7:34:11 PM |
[★☆☆] Ransomware - Recovery 2 | Cryptography | 3 | April 6th, 4:47:04 PM |
[★☆☆] Adversary - 3AES | Cryptography | 3 | April 6th, 3:14:55 PM |
[★★☆] JAILE - User | Web Exploitation and Binary Exploitation | 6 | April 6th, 12:31:41 PM |
[★★☆] JAILE - Calculator | Web Exploitation and Binary Exploitation | 6 | April 5th, 11:30:35 PM |
[★☆☆] Ransomware - Recovery 1 | Cryptography | 3 | April 5th, 10:56:52 PM |
[★★☆] Equestria - The Dark Ruler | Web Exploitation and Binary Exploitation | 6 | April 5th, 7:27:24 PM |
[★★☆] Equestria - Shadow Realm | Web Exploitation and Binary Exploitation | 6 | April 5th, 7:26:01 PM |
[★★☆] Equestria - Door To The Stable | Web Exploitation and Binary Exploitation | 6 | April 5th, 7:25:03 PM |
[★☆☆] Adversary - Almost Classic | Cryptography | 3 | April 2nd, 10:23:50 PM |
Solves (NaN%)
Fails (NaN%)