R3d_4lch3m1st

Switzerland

29th place

167 points


Solves

Challenge Category Value Time
[★★☆] Short Crypto Tales - Suibom Cryptography 3
[★★☆] Eugene’s FATigue - Is that it? Forensics 6
[★☆☆] The Chronicles of Greg 2 - Frustrating compression Forensics 3
[★☆☆] Ransomware - Recovery 3 Cryptography 9
[★★☆] Short Crypto Tales - MorizOtis Cryptography 3
[★☆☆] Ransomware - Recovery 2 Cryptography 3
[★☆☆] The digital trail - The escape plan OSINT 9
[★☆☆] The digital trail - The private channel OSINT 3
[★☆☆] The digital trail - The digital footprint OSINT 3
[★☆☆] The digital trail - The evidence OSINT 3
[★☆☆] The digital trail - The tip OSINT 3
[★★★] Suspect tracking - Identification OSINT 9
[★★☆] The Chronicles of Greg - SystemUpdate incident report Malware Analysis and Reverse Engineering 6
[★☆☆] Bastion - The backdoor culprit Forensics 9
[★☆☆] Bastion - Feel free to dig in Forensics 3
[★☆☆] Bastion - Clean bastion Forensics 3
[★☆☆] Bastion - Inspect the file system Forensics 3
[★☆☆] Bastion - So much just from logs Forensics 3
[★★☆] JAILE - Calculator Web Exploitation and Binary Exploitation 6
[★☆☆] Ransomware - Recovery 1 Cryptography 3
[★☆☆] Adversary - Key exchange Cryptography 9
[★☆☆] Adversary - 3AES Cryptography 3
[★☆☆] Adversary - Almost Classic Cryptography 3
[☆☆☆] Advanced Decryption Standard - easy like counting up to three Cryptography 1
[☆☆☆] Advanced Decryption Standard - Blockchain Cryptography 1
[☆☆☆] Advanced Decryption Standard - Codebook Cryptography 1
[★★☆] Equestria - The Dark Ruler Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Shadow Realm Web Exploitation and Binary Exploitation 6
[★★☆] Equestria - Door To The Stable Web Exploitation and Binary Exploitation 6
[★☆☆] ConnectionChecker - Executer Malware Analysis and Reverse Engineering 9
[★☆☆] ConnectionChecker - Lies Malware Analysis and Reverse Engineering 3
[★☆☆] ConnectionChecker - Tool Malware Analysis and Reverse Engineering 3
[☆☆☆] SanityChecker - Password protected Malware Analysis and Reverse Engineering 1
[☆☆☆] SanityChecker - Bash dropper Malware Analysis and Reverse Engineering 1
[★★☆] Eugene’s FATigue - Was that the only file? Forensics 6
[☆☆☆] First Contact - Or hack their mainframe... Forensics 1
[☆☆☆] First Contact - Independence day Forensics 1
[☆☆☆] First Contact - A Day in the Strife Forensics 1
[☆☆☆] First Contact - Between 15 and 17 Forensics 1
[☆☆☆] First Contact - Still fighting Forensics 1
[★★☆] Eugene’s FATigue - FATigue Forensics 6
[☆☆☆] First Contact - So long, but wait, we’re still playing! Forensics 1
[☆☆☆] First Contact - In competition with jellyfish Forensics 1
[☆☆☆] SanityChecker - Sleepy python Malware Analysis and Reverse Engineering 1
[☆☆☆] First Contact - Hard choices Forensics 1