vscehha353
43rd place
84 points
Members
User Name | Score |
vscehha353 | 84 |
Awards
Hint 120
hints
Hint for IDS meets encryption
-5
Hint 121
hints
Hint for IDS meets encryption
-20
Hint 123
hints
Hint for How much data?
-25
Hint 16
hints
Hint for HTTP Interpretation 1
-2
Hint 17
hints
Hint for HTTP Interpretation 1
-5
Hint 19
hints
Hint for HTTP Interpretation 2
-2
Hint 20
hints
Hint for HTTP Interpretation 2
-5
Hint 21
hints
Hint for HTTP Interpretation 3
-2
Hint 22
hints
Hint for HTTP Interpretation 3
-5
Hint 23
hints
Hint for HTTP Logs 1.1
-5
Hint 24
hints
Hint for HTTP Logs 1.1
-10
Hint 26
hints
Hint for HTTP Logs 1.2
-15
Hint 25
hints
Hint for HTTP Logs 1.2
-5
Hint 29
hints
Hint for HTTP Logs 1.3
-5
Hint 30
hints
Hint for HTTP Logs 1.3
-10
Hint 31
hints
Hint for HTTP Logs 1.3
-20
Hint 28
hints
Hint for HTTP Logs 1.4
-15
Hint 27
hints
Hint for HTTP Logs 1.4
-5
Hint 33
hints
Hint for HTTP Logs 1.5
-25
Hint 32
hints
Hint for HTTP Logs 1.5
-10
Hint 35
hints
Hint for HTTP Logs 1.6
-25
Hint 34
hints
Hint for HTTP Logs 1.6
-15
Hint 37
hints
Hint for HTTP Phishing 1
-25
Hint 36
hints
Hint for HTTP Phishing 1
-10
Hint 39
hints
Hint for HTTP Phishing 2
-25
Hint 38
hints
Hint for HTTP Phishing 2
-10
Hint 41
hints
Hint for HTTP Phishing 3
-25
Hint 40
hints
Hint for HTTP Phishing 3
-15
Hint 42
hints
Hint for HTTP Phishing 4
-10
Hint 43
hints
Hint for HTTP Phishing 4
-5
Hint 44
hints
Hint for HTTP Phishing 5
-25
Hint 45
hints
Hint for HTTP Phishing 6
-25
Hint 46
hints
Hint for HTTP Phishing 7
-20
Hint 47
hints
Hint for HTTP Phishing 7
-10
Hint 115
hints
Hint for HTTP Phishing 8
-15
Hint 84
hints
Hint for File Sharing is Caring
-25
Hint 85
hints
Hint for Let me in!
-5
Solves
Challenge | Category | Value | Time |
Secure Document 1 | Suspicious Files 2 | 15 | |
Secure Document 2 | Suspicious Files 2 | 20 | |
Secure Document 3 | Suspicious Files 2 | 25 | |
Secure Document 4 | Suspicious Files 2 | 25 | |
TLS 1.3 | HTTPS | 15 | |
Let's Encrypt! | HTTPS | 20 | |
IDS meets encryption | HTTPS | 20 | |
How much data? | HTTPS | 25 | |
HTTP Interpretation 1 | HTTP | 5 | |
HTTP Interpretation 2 | HTTP | 5 | |
HTTP Interpretation 3 | HTTP | 5 | |
HTTP Logs 1.1 | HTTP | 10 | |
HTTP Logs 1.2 | HTTP | 15 | |
HTTP Logs 1.3 | HTTP | 20 | |
HTTP Logs 1.4 | HTTP | 20 | |
HTTP Logs 1.5 | HTTP | 25 | |
HTTP Logs 1.6 | HTTP | 25 | |
HTTP Phishing 1 | HTTP | 25 | |
HTTP Phishing 2 | HTTP | 25 | |
HTTP Phishing 3 | HTTP | 25 | |
HTTP Phishing 4 | HTTP | 25 | |
HTTP Phishing 5 | HTTP | 25 | |
HTTP Phishing 6 | HTTP | 25 | |
HTTP Phishing 7 | HTTP | 20 | |
HTTP Phishing 8 | HTTP | 25 | |
Email Analysis 1.7 | SMTP | 15 | |
DNS Concepts 3 | DNS | 5 | |
Email Analysis 2.2 | SMTP 2 | 10 | |
Email Analysis 2.8 | SMTP 2 | 25 | |
Let me in! | Host Events | 25 |