x86instructionset

1st place

955 points


Awards


Solves

Challenge Category Value Time
Password Pandemonium Cryptography 10
Not (De)Bugging Me Reverse Engineering 20
Catch Me If You Can OSINT 20
Trust but Verify Cryptography 45
Rendezvous Redirect Cryptography 20
Iconic Misc 25
SOAP Forensics 15
Play Ball OSINT 45
Bots? Still no Bots! Web Security 45
How Good is the Privacy? Cryptography 25
Double the Fun Cryptography 25
Bytes from Life Forensics 45
Twin Trouble Cryptography 15
Through the Looking Glass 1 OSINT 10
Ghost in the Wires Steganography 65
Log Leak Steganography 30
Silent Segment Steganography 30
Do You Believe in Magic Forensics 35
Buried Bytes Forensics 30
Rolling the Dice Math 15
Counting Cards Math 15
Bias Detection Math 10
Let's Go Sledding Binary Exploitation 25
Bug Out Malware 5
Data Structures 2 Programming 25
Objectively Malicious Forensics 5
Need Time to Process Windows 10
Less Complicated Misc 10
Got Joke? Misc 10
Logic Chamber Misc 10
QWERTY Misc 5
Fundamental Truth Misc 5
DNS Basics Networking 5
Data Structures 1 Programming 25
Libraries as Far as the Eye Can See Programming 15
The Godfather Malware 5
Call of the WinAPI Malware 15
Family Matters Malware 10
YARAmageddon Malware 30
No Bots Allowed Web Security 40
Trusted by All Cryptography 5
The Unchanging Identifier Windows 10
Signal Boost Math 5
Logical Identity Math 5
Zero-Click Binary Exploitation 15
Now You've Gone Too Far Binary Exploitation 15
Strings on Disk Forensics 35
Top Secret 2 Steganography 10
Top Secret 1 Steganography 5
Gain Access 0