pogo

7th place

368 points


Solves

Challenge Category Value Time
[★★☆] ByteBusters - Terminal Magic Web Exploitation and Binary Exploitation 6 June 2nd, 2:50:02 PM
[★☆☆] The digital trail - The private channel OSINT 3 May 29th, 2:56:25 PM
[★☆☆] The digital trail - The digital footprint OSINT 3 May 29th, 2:56:16 PM
[★☆☆] The digital trail - The evidence OSINT 3 May 29th, 2:40:07 PM
[★☆☆] The digital trail - The tip OSINT 3 May 29th, 2:31:21 PM
[★★☆] Short Crypto Tales - Suibom Cryptography 3 May 21st, 9:57:04 AM
[★★☆] Short Crypto Tales - MorizOtis Cryptography 3 May 20th, 8:34:01 PM
[★☆☆] Bastion - The backdoor culprit Forensics 9 May 12th, 11:19:45 AM
[★☆☆] Bastion - Feel free to dig in Forensics 3 May 12th, 11:18:20 AM
[★☆☆] Bastion - Clean bastion Forensics 3 May 12th, 11:17:19 AM
[★★☆] The Chronicles of Greg - The Shared Object Prophecy Malware Analysis and Reverse Engineering 18 May 12th, 10:25:25 AM
[★★☆] The Chronicles of Greg - The Blob Whisperer Malware Analysis and Reverse Engineering 6 May 11th, 8:41:44 PM
[★★☆] The Chronicles of Greg - SystemUpdate incident report Malware Analysis and Reverse Engineering 6 May 11th, 3:09:21 PM
[★☆☆] Bastion - Inspect the file system Forensics 3 May 11th, 12:37:32 PM
[★☆☆] Bastion - So much just from logs Forensics 3 May 11th, 12:34:57 PM
[★★☆] JAILE2 - Blazing-fast, memory-safe interpreter Web Exploitation and Binary Exploitation 18 April 30th, 11:04:49 AM
[★★☆] JAILE2 - dictFS Web Exploitation and Binary Exploitation 6 April 30th, 7:42:58 AM
[★★☆] JAILE2 - The Tasty Bun Web Exploitation and Binary Exploitation 6 April 28th, 1:18:30 PM
[★★☆] JAILE2 - Calculator v2 Web Exploitation and Binary Exploitation 6 April 28th, 10:23:53 AM
[★★★] Elliptic - 3 Curves and mysterious story Cryptography 27 April 15th, 12:57:34 PM
[★★★] Elliptic - How to break so many bits? Cryptography 9 April 15th, 10:22:27 AM
[☆☆☆] First Contact - Or hack their mainframe... Forensics 1 April 15th, 10:15:55 AM
[☆☆☆] First Contact - Independence day Forensics 1 April 15th, 10:11:34 AM
[☆☆☆] First Contact - A Day in the Strife Forensics 1 April 15th, 10:11:01 AM
[☆☆☆] First Contact - Between 15 and 17 Forensics 1 April 15th, 10:10:49 AM
[☆☆☆] First Contact - Still fighting Forensics 1 April 15th, 10:10:34 AM
[☆☆☆] First Contact - So long, but wait, we’re still playing! Forensics 1 April 15th, 10:09:45 AM
[☆☆☆] First Contact - In competition with jellyfish Forensics 1 April 15th, 10:09:19 AM
[☆☆☆] First Contact - Hard choices Forensics 1 April 15th, 10:08:15 AM
[★☆☆] Ransomware - Recovery 3 Cryptography 9 April 15th, 9:23:20 AM
[☆☆☆] Advanced Decryption Standard - easy like counting up to three Cryptography 1 April 15th, 9:22:50 AM
[☆☆☆] Advanced Decryption Standard - Blockchain Cryptography 1 April 15th, 9:22:02 AM
[☆☆☆] Advanced Decryption Standard - Codebook Cryptography 1 April 14th, 9:01:19 PM
[☆☆☆] SanityChecker - Password protected Malware Analysis and Reverse Engineering 1 April 14th, 8:58:48 PM
[☆☆☆] SanityChecker - Bash dropper Malware Analysis and Reverse Engineering 1 April 14th, 8:53:19 PM
[☆☆☆] SanityChecker - Sleepy python Malware Analysis and Reverse Engineering 1 April 14th, 8:53:09 PM
[★★☆] Equestria - Final Curse Web Exploitation and Binary Exploitation 18 April 14th, 6:05:08 PM
[★☆☆] Adversary - Key exchange Cryptography 9 April 14th, 2:14:42 PM
[★★★] Elliptic - Simple curve definition Cryptography 9 April 13th, 10:05:43 PM
[★☆☆] Adversary - 3AES Cryptography 3 April 12th, 1:52:22 PM
[★★☆] JAILE - Final Escape Web Exploitation and Binary Exploitation 18 April 12th, 12:35:12 PM
[★★☆] Equestria - The Dark Ruler Web Exploitation and Binary Exploitation 6 April 12th, 10:06:22 AM
[★★☆] Equestria - Shadow Realm Web Exploitation and Binary Exploitation 6 April 11th, 4:35:15 PM
[★★☆] JAILE - User Web Exploitation and Binary Exploitation 6 April 11th, 4:01:09 PM
[★★☆] JAILE - Calculator Web Exploitation and Binary Exploitation 6 April 11th, 2:58:33 PM
[★★☆] Equestria - Door To The Stable Web Exploitation and Binary Exploitation 6 April 10th, 4:09:51 PM
[★☆☆] Ransomware - Recovery 2 Cryptography 3 April 10th, 4:07:48 PM
[★☆☆] Ransomware - Recovery 1 Cryptography 3 April 10th, 4:07:41 PM
[★☆☆] Adversary - Almost Classic Cryptography 3 April 10th, 4:06:36 PM
[★☆☆] ConnectionChecker - Executer Malware Analysis and Reverse Engineering 9 April 10th, 3:00:40 PM
[★☆☆] ConnectionChecker - Lies Malware Analysis and Reverse Engineering 3 April 10th, 2:38:48 PM
[★☆☆] ConnectionChecker - Tool Malware Analysis and Reverse Engineering 3 April 10th, 2:14:51 PM
[★★★] Suspect tracking - Golden Hour OSINT 27 April 10th, 1:49:06 PM
[★★★] Suspect tracking - Localization OSINT 9 April 10th, 1:48:36 PM
[★★★] Suspect tracking - Identification OSINT 9 April 10th, 1:01:02 PM
[★★☆] Eugene’s FATigue - Wrapping it up Forensics 18 April 10th, 12:43:54 PM
[★★☆] Eugene’s FATigue - It tastes like a poem Forensics 6 April 10th, 12:43:38 PM
[★★☆] Eugene’s FATigue - Was that the only file? Forensics 6 April 6th, 8:28:24 AM
[★★☆] Eugene’s FATigue - Is that it? Forensics 6 April 6th, 8:28:14 AM
[★★☆] Eugene’s FATigue - FATigue Forensics 6 April 6th, 8:27:55 AM
Solves (NaN%)
Fails (NaN%)