;
Challenge | Solved | Points |
---|---|---|
Abuse Mail (Network) | #51, 1 day, 8 hours after release (2017-08-06 18:20:52) | 300 |
Ethical Hacker (Web) | #28, 1 day, 2 hours after release (2017-08-06 12:43:30) | 200 |
Secure Login (Crypto) | #44, 1 day after release (2017-08-06 10:10:41) | 200 |
WannaFly (Forensics) | #113, 15 hours, 41 minutes after release (2017-08-06 01:41:53) | 100 |
Vod Kanockers (Network) | #125, 13 hours, 28 minutes after release (2017-08-05 23:28:15) | 100 |
Stack Overflow (Crypto) | #101, 12 hours, 25 minutes after release (2017-08-05 22:25:22) | 100 |
Malware Testrun (Network) | #51, 9 hours, 39 minutes after release (2017-08-05 19:39:50) | 200 |
Growing Up (Misc) | #40, 9 hours, 23 minutes after release (2017-08-05 19:23:15) | 200 |
Megan-35 (Pwnable) | #16, 6 hours, 48 minutes after release (2017-08-05 16:48:07) | 200 |
Suspect File 1 (Binary) | #19, 5 hours, 38 minutes after release (2017-08-05 15:38:37) | 100 |
Compromised? (Forensics) | #27, 4 hours, 26 minutes after release (2017-08-05 14:26:24) | 100 |
Bon Appétit (Web) | #38, 2 hours, 9 minutes after release (2017-08-05 12:09:25) | 100 |
asby (Binary) | #30, 1 hour, 29 minutes after release (2017-08-05 11:29:46) | 100 |