alice

Other

22nd place

3185 points


Solves

Challenge Category Value Time
The Contract Cryptography 350
Fibonacci Caesar Cryptography 184
Bootstrap Betrayal Web exploitation 231
Persistance is Key Forensics 368
G-Server Web exploitation 174
PleaseNoCry Web exploitation 203
Existential loading bar Web exploitation 174
fear of long words Binary 350
Hasher: Trust the Hash (They Said) Misc 131
Binary Caesar Cryptography 143
Call Me Maybe Reverse Engineering 190
WiFi Heist Reverse Engineering 179
Unbake the cake Reverse Engineering 155
Pepstein Forensics 123
Broken Invoice Forensics 117
alog Forensics 113