Users
Teams
Scoreboard
Challenges
Register
Login
test_seth
test_seth
5th
place
1100
points
Awards
Solves
Challenge
Category
Value
Time
Secure Document 1
Suspicious Files 2
15
Secure Document 2
Suspicious Files 2
20
Secure Document 3
Suspicious Files 2
25
Secure Document 4
Suspicious Files 2
25
HTTP Interpretation 1
HTTP
5
HTTP Interpretation 2
HTTP
5
HTTP Interpretation 3
HTTP
5
Invoice 1
Suspicious Files 3
15
Invoice 2
Suspicious Files 3
20
Invoice 3
Suspicious Files 3
20
Invoice 4
Suspicious Files 3
20
Invoice 5
Suspicious Files 3
25
Love Letter 1
Suspicious Files 1
15
Love Letter 2
Suspicious Files 1
20
Love Letter 3
Suspicious Files 1
20
Love Letter 4
Suspicious Files 1
20
Email Analysis 2.1
SMTP 2
10
Email Analysis 2.3
SMTP 2
10
TLS 1.3
HTTPS
15
Let's Encrypt!
HTTPS
20
IDS meets encryption
HTTPS
20
How much data?
HTTPS
25
HTTP Logs 1.1
HTTP
10
HTTP Logs 1.2
HTTP
15
HTTP Logs 1.4
HTTP
20
HTTP Logs 1.3
HTTP
20
HTTP Logs 1.5
HTTP
25
HTTP Logs 1.6
HTTP
25
HTTP Phishing 1
HTTP
25
HTTP Phishing 2
HTTP
25
HTTP Phishing 3
HTTP
25
HTTP Phishing 4
HTTP
25
HTTP Phishing 5
HTTP
25
HTTP Phishing 6
HTTP
25
HTTP Phishing 7
HTTP
20
HTTP Phishing 8
HTTP
25
Email Analysis 2.2
SMTP 2
10
Email Analysis 2.4
SMTP 2
15
Email Analysis 2.5
SMTP 2
15
Email Analysis 2.6
SMTP 2
20
Email Analysis 2.7
SMTP 2
25
Email Analysis 2.8
SMTP 2
25
Email Analysis 1.1
SMTP
5
Email Analysis 1.2
SMTP
10
Email Analysis 1.3
SMTP
10
Email Analysis 1.4
SMTP
10
Email Analysis 1.6
SMTP
15
Email Analysis 1.7
SMTP
15
Email Analysis 1.5
SMTP
15
DNS Concepts 1
DNS
5
DNS Concepts 2
DNS
5
DNS Concepts 3
DNS
5
DNS Concepts 4
DNS
15
DNS Concepts 5
DNS
15
DNS Logs 1
DNS
20
DNS Logs 2
DNS
20
External DNS
DNS
25
Doppelgänger
DNS
25
SSH Outbound
Protocol Grab Bag
20
Rogue Device
Protocol Grab Bag
20
An Attempt Was Made...
Protocol Grab Bag
25
Remote Administration
Protocol Grab Bag
25