|
Wordse... needles in a haystack
|
Programming |
50 |
|
|
Email Detective
|
Forensics |
5 |
|
|
Modulo3: No. No way.
|
Math |
20 |
|
|
Dvorak kept the shift on left :)
|
Cryptography |
10 |
|
|
Langdon, Robert Langdon
|
Forensics |
5 |
|
|
Mixed Signals
|
Forensics |
5 |
|
|
Fishing in the woods
|
Forensics |
5 |
|
|
Wordsearch 20-20
|
Programming |
10 |
|
|
Wireshark 11
|
Web Security |
5 |
|
|
Wireshark 2
|
Networking |
5 |
|
|
Wordsearch
|
Programming |
5 |
|
|
Slithery Snake
|
Programming |
5 |
|
|
Wireshark 1
|
Networking |
5 |
|
|
Counter Culture
|
Miscellaneous |
5 |
|
|
Printer's Dilemma
|
Reverse Engineering |
10 |
|
|
Return of the Metadata
|
Reverse Engineering |
10 |
|
|
Bad Actor Intercept
|
Networking |
10 |
|
|
In the Event of My Demise
|
Reverse Engineering |
10 |
|
|
Modulo2: But is it always?
|
Math |
10 |
|
|
Same... but Different
|
Programming |
5 |
|
|
Modulo: It's What's Left Over
|
Math |
5 |
|
|
What Flag Flies Here 1
|
Miscellaneous |
5 |
|
|
Speaking of the UN…
|
Miscellaneous |
5 |
|
|
How many flags fly here?
|
Miscellaneous |
5 |
|
|
What's the code?
|
Miscellaneous |
5 |
|
|
Hacked?
|
Miscellaneous |
5 |
|
|
Paper Trail
|
Physical Challenges |
10 |
|
|
Freq 3
|
Cryptography |
5 |
|
|
No 1 Victory Toilet
|
Cryptography |
5 |
|
|
Don’t Shifty Too Far
|
Cryptography |
5 |
|
|
Order of Operations
|
Math |
5 |
|
|
Broken HTTPS?
|
Web Security |
10 |
|
|
Buff-er What?
|
Binary Exploitation |
10 |
|
|
I hate acronyms…
|
Forensics |
10 |
|
|
Memory Lane 2: Stacked
|
Binary Exploitation |
20 |
|
|
Port Authority 1
|
OSINT |
20 |
|
|
Seasick
|
Forensics |
15 |
|
|
Memory Lane 1: Cold Start
|
Binary Exploitation |
20 |
|
|
Submarine Sandwich Origins
|
OSINT |
10 |
|
|
Shifty Cipher
|
Cryptography |
5 |
|
|
Base Instincts
|
Forensics |
5 |
|
|
Dashing Dots
|
Forensics |
5 |
|
|
EKC 4
|
OSINT |
5 |
|
|
EKC 3
|
OSINT |
5 |
|
|
EKC 2
|
OSINT |
5 |
|
|
EKC 1
|
OSINT |
5 |
|
|
Gain Access
|
|
0 |
|