joshvon44

6th place

4768 points


Awards


Kahoot 3rd place

Kahoot

Got 3rd place in a Kahoot

10


Solves

Challenge Category Value Time
Sanity Check Freebie 1
revgrep Forensics 5
MyPlanForWorldDomination Forensics 6
rotate Reverse Engineering 10
baby base64 Crypto: Misc 2
powermod Crypto: Number Theory 15
base64 Crypto: Misc 25
imgxor Crypto: Misc 50
speedrun0 Binary Exploitation: Stack 20
java.lang.String Reverse Engineering 50
SoftwareShop Reverse Engineering 75
Security Questions Web 25
snek Crypto: Misc 3
Encoding Mash Crypto: Misc 8
Unlocked Crypto: Block Ciphers 6
Lonely XOR Crypto: Misc 12
Unsalted Crypto: Misc 8
OSU Browser Web 15
biscuit Web 20
Somewhat Questionable LLC Web 25
JustAPacket Forensics 10
GPS Forensics 15
cstrings Forensics 20
baby recycle Forensics 30
recycle Forensics 50
dump Reverse Engineering 20
revpwn0 Reverse Engineering 35
revpwn1 Reverse Engineering 45
Dreese Lab Gift Shop Web 70
scrape Web 35
speedrun0.25 Binary Exploitation: Stack 25
speedrun0.5 Binary Exploitation: Stack 40
speedrun1 Binary Exploitation: Stack 44
speedrun2 Binary Exploitation: Stack 48
Auth Bot 2 Web 50
speedrun4 Binary Exploitation: Stack 52
Exfiltration Forensics 20
speedrun5 Binary Exploitation: Stack 56
stegoxorus Crypto: Misc 30
crap Forensics 40
revpwn2 Reverse Engineering 60
TLS Forensics 75
Swirler Reverse Engineering 30
Cheap stream cipher Crypto: Misc 75
pixelboard Web 20
revpwn3 Reverse Engineering 80
Teerolls Reverse Engineering 130
SIGALRM Reverse Engineering 60
rewrite Web 25
speedrun3 Binary Exploitation: Stack 72
speedrun6 Binary Exploitation: Stack 92
pointers Binary Exploitation: Stack 100
speedrun7 Binary Exploitation: Stack 104
speedrun8 Binary Exploitation: Stack 120
speedrun9 Binary Exploitation: Stack 128
speedrun10 Binary Exploitation: Stack 136
speedrun11 Binary Exploitation: Stack 160
speedrun13 Binary Exploitation: Stack 180
speedrun12 Binary Exploitation: Stack 200
ret2libc Binary Exploitation: Stack 215
SROP Binary Exploitation: Stack 230
ret2libc_canary Binary Exploitation: Stack 250
Stack Pivot 1 Binary Exploitation: Stack 255
Stack Pivot 2 Binary Exploitation: Stack 285
hexlify Binary Exploitation: Heap 300
antitamper Reverse Engineering 80
ransomware Reverse Engineering 180