pogo
7th place
368 points
Solves
Challenge | Category | Value | Time |
---|---|---|---|
[★★☆] ByteBusters - Terminal Magic | Web Exploitation and Binary Exploitation | 6 | June 2nd, 2:50:02 PM |
[★☆☆] The digital trail - The private channel | OSINT | 3 | May 29th, 2:56:25 PM |
[★☆☆] The digital trail - The digital footprint | OSINT | 3 | May 29th, 2:56:16 PM |
[★☆☆] The digital trail - The evidence | OSINT | 3 | May 29th, 2:40:07 PM |
[★☆☆] The digital trail - The tip | OSINT | 3 | May 29th, 2:31:21 PM |
[★★☆] Short Crypto Tales - Suibom | Cryptography | 3 | May 21st, 9:57:04 AM |
[★★☆] Short Crypto Tales - MorizOtis | Cryptography | 3 | May 20th, 8:34:01 PM |
[★☆☆] Bastion - The backdoor culprit | Forensics | 9 | May 12th, 11:19:45 AM |
[★☆☆] Bastion - Feel free to dig in | Forensics | 3 | May 12th, 11:18:20 AM |
[★☆☆] Bastion - Clean bastion | Forensics | 3 | May 12th, 11:17:19 AM |
[★★☆] The Chronicles of Greg - The Shared Object Prophecy | Malware Analysis and Reverse Engineering | 18 | May 12th, 10:25:25 AM |
[★★☆] The Chronicles of Greg - The Blob Whisperer | Malware Analysis and Reverse Engineering | 6 | May 11th, 8:41:44 PM |
[★★☆] The Chronicles of Greg - SystemUpdate incident report | Malware Analysis and Reverse Engineering | 6 | May 11th, 3:09:21 PM |
[★☆☆] Bastion - Inspect the file system | Forensics | 3 | May 11th, 12:37:32 PM |
[★☆☆] Bastion - So much just from logs | Forensics | 3 | May 11th, 12:34:57 PM |
[★★☆] JAILE2 - Blazing-fast, memory-safe interpreter | Web Exploitation and Binary Exploitation | 18 | April 30th, 11:04:49 AM |
[★★☆] JAILE2 - dictFS | Web Exploitation and Binary Exploitation | 6 | April 30th, 7:42:58 AM |
[★★☆] JAILE2 - The Tasty Bun | Web Exploitation and Binary Exploitation | 6 | April 28th, 1:18:30 PM |
[★★☆] JAILE2 - Calculator v2 | Web Exploitation and Binary Exploitation | 6 | April 28th, 10:23:53 AM |
[★★★] Elliptic - 3 Curves and mysterious story | Cryptography | 27 | April 15th, 12:57:34 PM |
[★★★] Elliptic - How to break so many bits? | Cryptography | 9 | April 15th, 10:22:27 AM |
[☆☆☆] First Contact - Or hack their mainframe... | Forensics | 1 | April 15th, 10:15:55 AM |
[☆☆☆] First Contact - Independence day | Forensics | 1 | April 15th, 10:11:34 AM |
[☆☆☆] First Contact - A Day in the Strife | Forensics | 1 | April 15th, 10:11:01 AM |
[☆☆☆] First Contact - Between 15 and 17 | Forensics | 1 | April 15th, 10:10:49 AM |
[☆☆☆] First Contact - Still fighting | Forensics | 1 | April 15th, 10:10:34 AM |
[☆☆☆] First Contact - So long, but wait, we’re still playing! | Forensics | 1 | April 15th, 10:09:45 AM |
[☆☆☆] First Contact - In competition with jellyfish | Forensics | 1 | April 15th, 10:09:19 AM |
[☆☆☆] First Contact - Hard choices | Forensics | 1 | April 15th, 10:08:15 AM |
[★☆☆] Ransomware - Recovery 3 | Cryptography | 9 | April 15th, 9:23:20 AM |
[☆☆☆] Advanced Decryption Standard - easy like counting up to three | Cryptography | 1 | April 15th, 9:22:50 AM |
[☆☆☆] Advanced Decryption Standard - Blockchain | Cryptography | 1 | April 15th, 9:22:02 AM |
[☆☆☆] Advanced Decryption Standard - Codebook | Cryptography | 1 | April 14th, 9:01:19 PM |
[☆☆☆] SanityChecker - Password protected | Malware Analysis and Reverse Engineering | 1 | April 14th, 8:58:48 PM |
[☆☆☆] SanityChecker - Bash dropper | Malware Analysis and Reverse Engineering | 1 | April 14th, 8:53:19 PM |
[☆☆☆] SanityChecker - Sleepy python | Malware Analysis and Reverse Engineering | 1 | April 14th, 8:53:09 PM |
[★★☆] Equestria - Final Curse | Web Exploitation and Binary Exploitation | 18 | April 14th, 6:05:08 PM |
[★☆☆] Adversary - Key exchange | Cryptography | 9 | April 14th, 2:14:42 PM |
[★★★] Elliptic - Simple curve definition | Cryptography | 9 | April 13th, 10:05:43 PM |
[★☆☆] Adversary - 3AES | Cryptography | 3 | April 12th, 1:52:22 PM |
[★★☆] JAILE - Final Escape | Web Exploitation and Binary Exploitation | 18 | April 12th, 12:35:12 PM |
[★★☆] Equestria - The Dark Ruler | Web Exploitation and Binary Exploitation | 6 | April 12th, 10:06:22 AM |
[★★☆] Equestria - Shadow Realm | Web Exploitation and Binary Exploitation | 6 | April 11th, 4:35:15 PM |
[★★☆] JAILE - User | Web Exploitation and Binary Exploitation | 6 | April 11th, 4:01:09 PM |
[★★☆] JAILE - Calculator | Web Exploitation and Binary Exploitation | 6 | April 11th, 2:58:33 PM |
[★★☆] Equestria - Door To The Stable | Web Exploitation and Binary Exploitation | 6 | April 10th, 4:09:51 PM |
[★☆☆] Ransomware - Recovery 2 | Cryptography | 3 | April 10th, 4:07:48 PM |
[★☆☆] Ransomware - Recovery 1 | Cryptography | 3 | April 10th, 4:07:41 PM |
[★☆☆] Adversary - Almost Classic | Cryptography | 3 | April 10th, 4:06:36 PM |
[★☆☆] ConnectionChecker - Executer | Malware Analysis and Reverse Engineering | 9 | April 10th, 3:00:40 PM |
[★☆☆] ConnectionChecker - Lies | Malware Analysis and Reverse Engineering | 3 | April 10th, 2:38:48 PM |
[★☆☆] ConnectionChecker - Tool | Malware Analysis and Reverse Engineering | 3 | April 10th, 2:14:51 PM |
[★★★] Suspect tracking - Golden Hour | OSINT | 27 | April 10th, 1:49:06 PM |
[★★★] Suspect tracking - Localization | OSINT | 9 | April 10th, 1:48:36 PM |
[★★★] Suspect tracking - Identification | OSINT | 9 | April 10th, 1:01:02 PM |
[★★☆] Eugene’s FATigue - Wrapping it up | Forensics | 18 | April 10th, 12:43:54 PM |
[★★☆] Eugene’s FATigue - It tastes like a poem | Forensics | 6 | April 10th, 12:43:38 PM |
[★★☆] Eugene’s FATigue - Was that the only file? | Forensics | 6 | April 6th, 8:28:24 AM |
[★★☆] Eugene’s FATigue - Is that it? | Forensics | 6 | April 6th, 8:28:14 AM |
[★★☆] Eugene’s FATigue - FATigue | Forensics | 6 | April 6th, 8:27:55 AM |
Solves (NaN%)
Fails (NaN%)