SMB445

4th place

5201 points


Members

User Name Score
zedude 1330
fab445 3262
Vadelios 39
RainbowSix 570

Awards


Hint 146

hints

Hint for Getting around Fukuoka

-30


Hint 145

hints

Hint for Getting around Fukuoka

-50


Hint 176

hints

Hint for Jupyter Ascending

-50


Hint 178

hints

Hint for whereami

-50


Hint 197

hints

Hint for the doggie ate the cat now?

-40


Hint 193

hints

Hint for the doggie ate the cat now?

-10


Hint 192

hints

Hint for the doggie ate the cat now?

-40


Hint 211

hints

Hint for BEC - Azure UAL (4/4)

-10


Hint 210

hints

Hint for BEC - Azure UAL (4/4)

-10


Solves

Challenge Category Value Time
Muddy Waters Forensics 250
Getting around Fukuoka Crypto 100
Challenges for BlockChain technology (3/5) Blockchain 100
IPv6 bogons Network 100
Serial Standard Spying - 3/3 ICS 100
Serial Standard Spying - 2/3 ICS 100
Serial Standard Spying - 1/3 ICS 100
Exploring Esoteric Exploits - 2/4 ICS 100
Exploring Esoteric Exploits - 1/4 ICS 100
SIM3 (4) Do you know what we deliver as services... SIM3 200
SIM3 (3) Late at handling an incident... SIM3 200
SIM3 (5) Updating an RFC 2350 SIM3 100
SIM3 (2) Staff issues SIM3 100
SIM3 (1) How well do the CSIRT knows it constituents? SIM3 100
DNS Nibble - Bonus Network 57
Warm Up 1 Crypto 13
Web Has More Content Web 100
Service goes wild CTI 100
CTI (VT) challenge (4/7) CTI 100
CTI (VT) challenge (3/7) CTI 100
Challenges for BlockChain technology (1/5) Blockchain 100
CTI (VT) challenge (1/7) CTI 100
Warm Up 3 Network 17
LLM Flag Hunt (1/2) Miscellaneous 20
BEC - Azure UAL (4/4) Forensics 160
ThreatActor CTI 100
Credential Harvesting CTI 100
cute doggie chews often Crypto 100
oh cute doggie, did you eat my challenge? Crypto 100
BEC - Azure UAL (3/4) Forensics 25
BEC - Azure UAL (2/4) Forensics 25
Follow the intruder (1) Crypto 100
BEC - Azure UAL (1/4) Forensics 25
Data Science/ Machine Learning (3/3) Data Science 10
Data Science/ Machine Learning (2/3) Data Science 10
Data Science/ Machine Learning (1/3) Data Science 10
Container Security / IaC (Infrastructure As Code) - Case Study (4/4) Containers 300
Container Security / IaC (Infrastructure As Code) - Case Study (3/4) Containers 150
Container Security / IaC (Infrastructure As Code) - Case Study (2/4) Containers 150
Container Security / IaC (Infrastructure As Code) - Case Study (1/4) Containers 150
Container Security / IaC (Infrastructure As Code) - Warmup (2/2) Containers 100
Container Security / IaC (Infrastructure As Code) - Warmup (1/2) Containers 10
Challenges for BlockChain technology (4/5) Blockchain 300
Challenges for BlockChain technology (2/5) Blockchain 100
Challenges for BlockChain technology (5/5) Blockchain 50
Blockchain (12/12) Blockchain 50
Blockchain (11/12) Blockchain 50
Blockchain (10/12) Blockchain 50
Blockchain (9/12) Blockchain 30
Blockchain (8/12) Blockchain 30
Blockchain (7/12) Blockchain 30
Blockchain (6/12) Blockchain 30
Blockchain (5/12) Blockchain 30
Blockchain (4/12) Blockchain 10
Blockchain (2/12) Blockchain 10
Blockchain (1/12) Blockchain 10
Secret Meeting Note Miscellaneous 100
Identify the monster Miscellaneous 10
FIRST SIGs Miscellaneous 10
FIRST History Miscellaneous 10
Canaries Miscellaneous 10
CTI (VT) challenge (2/7) CTI 100
Secret.c AppSec 100
Pollutant.py AppSec 200
Warm Up 2 Crypto 9
Intrusion Detection System Auditing 10
Firewall Auditing 10
Audit techniques Auditing 10
Start Here AppSec 50