jay

jays

40th place

95 points


Awards


Hint 117

hints

Hint for TLS 1.3

-15


Hint 118

hints

Hint for Let's Encrypt!

-20


Hint 121

hints

Hint for IDS meets encryption

-20


Hint 125

hints

Hint for Secure Document 4

-20


Hint 22

hints

Hint for HTTP Interpretation 3

-5


Hint 24

hints

Hint for HTTP Logs 1.1

-10


Hint 28

hints

Hint for HTTP Logs 1.4

-15


Hint 44

hints

Hint for HTTP Phishing 5

-25


Hint 42

hints

Hint for HTTP Phishing 4

-10


Hint 104

hints

Hint for Invoice 1

-15


Hint 110

hints

Hint for Invoice 4

-20


Hint 74

hints

Hint for Rogue Device

-20


Hint 80

hints

Hint for A Virus You Say?

-20


Hint 15

hints

Hint for Doppelgänger

-25


Hint 82

hints

Hint for USB Device

-20


Hint 123

hints

Hint for How much data?

-25


Hint 31

hints

Hint for HTTP Logs 1.3

-20


Hint 46

hints

Hint for HTTP Phishing 7

-20


Hint 78

hints

Hint for An Attempt Was Made...

-25


Hint 90

hints

Hint for Remote Administration

-25


Hint 87

hints

Hint for What is it?

-20


Hint 84

hints

Hint for File Sharing is Caring

-25


Hint 86

hints

Hint for Let me in!

-25


Hint 69

hints

Hint for Email Analysis 2.6

-20


Hint 71

hints

Hint for Email Analysis 2.7

-25


Hint 72

hints

Hint for Email Analysis 2.8

-25


Hint 94

hints

Hint for Love Letter 3

-20


Hint 13

hints

Hint for External DNS

-25


Hint 114

hints

Hint for DNS Concepts 5

-15


Hint 88

hints

Hint for DNS Concepts 4

-15


Hint 1

hints

Hint for DNS Concepts 2

-5


Hint 33

hints

Hint for HTTP Logs 1.5

-25


Hint 35

hints

Hint for HTTP Logs 1.6

-25


Hint 37

hints

Hint for HTTP Phishing 1

-25


Hint 95

hints

Hint for Love Letter 3

-5


Solves

Challenge Category Value Time
Secure Document 1 Suspicious Files 2 15
Secure Document 2 Suspicious Files 2 20
Secure Document 3 Suspicious Files 2 25
TLS 1.3 HTTPS 15
Let's Encrypt! HTTPS 20
HTTP Interpretation 1 HTTP 5
HTTP Interpretation 2 HTTP 5
HTTP Interpretation 3 HTTP 5
HTTP Logs 1.1 HTTP 10
HTTP Logs 1.2 HTTP 15
HTTP Logs 1.4 HTTP 20
Invoice 1 Suspicious Files 3 15
Invoice 2 Suspicious Files 3 20
Invoice 3 Suspicious Files 3 20
Invoice 5 Suspicious Files 3 25
Email Analysis 2.1 SMTP 2 10
Email Analysis 2.2 SMTP 2 10
Email Analysis 2.3 SMTP 2 10
Email Analysis 2.4 SMTP 2 15
Email Analysis 2.5 SMTP 2 15
Email Analysis 1.1 SMTP 5
Email Analysis 1.2 SMTP 10
Email Analysis 1.3 SMTP 10
Email Analysis 1.4 SMTP 10
Email Analysis 1.6 SMTP 15
Email Analysis 1.7 SMTP 15
Email Analysis 1.5 SMTP 15
Love Letter 1 Suspicious Files 1 15
Love Letter 2 Suspicious Files 1 20
Love Letter 4 Suspicious Files 1 20
DNS Concepts 1 DNS 5
DNS Concepts 3 DNS 5
DNS Logs 1 DNS 20
DNS Logs 2 DNS 20
Doppelgänger DNS 25
Rogue Device Protocol Grab Bag 20
SSH Outbound Protocol Grab Bag 20
IDS meets encryption HTTPS 20
HTTP Logs 1.3 HTTP 20
Invoice 4 Suspicious Files 3 20
A Virus You Say? Host Events 20
USB Device Host Events 20
What is it? Host Events 20
File Sharing is Caring Host Events 25
HTTP Logs 1.5 HTTP 25
Love Letter 3 Suspicious Files 1 20
DNS Concepts 2 DNS 5
DNS Concepts 4 DNS 15
DNS Concepts 5 DNS 15