| Mixcomp | Reversing | 300 |  | 
						
							
								| Exfiltration can be hidden anywhere | Network | 100 |  | 
						
							
								| Root Zone ccTLD Walk [part 2/2] | DNS | 150 |  | 
						
							
								| Obscure Exfiltration - Part 7 - Just a Side Note | Miscellaneous | 100 |  | 
						
							
								| Obscure Exfiltration - Part 6 - No Comment | Miscellaneous | 100 |  | 
						
							
								| Ransomware Attack at Global Oil Corporation (5/5) | Legal | 50 |  | 
						
							
								| Ransomware Attack at Global Oil Corporation (4/5) | Legal | 50 |  | 
						
							
								| Ransomware Attack at Global Oil Corporation (3/5) | Legal | 50 |  | 
						
							
								| Ransomware Attack at Global Oil Corporation (2/5) | Legal | 50 |  | 
						
							
								| Totally Legit Medical Firmware | Reversing | 300 |  | 
						
							
								| Back to the Future [2/6] | Forensics | 50 |  | 
						
							
								| X-ping-tration | Network | 100 |  | 
						
							
								| Communicating with a keyboard | Hardware | 500 |  | 
						
							
								| Network monitoring | Miscellaneous | 10 |  | 
						
							
								| Root Zone ccTLD Walk [part 1/2] | DNS | 50 |  | 
						
							
								| Ransomware Attack at Global Oil Corporation (1/5) | Legal | 50 |  | 
						
							
								| Operation Dry Pipe (4/4) | Legal | 50 |  | 
						
							
								| Operation Dry Pipe (3/4) | Legal | 50 |  | 
						
							
								| Operation Dry Pipe (2/4) | Legal | 50 |  | 
						
							
								| Operation Dry Pipe (1/4) | Legal | 50 |  | 
						
							
								| IP address | Network | 100 |  | 
						
							
								| Obscure Exfiltration - Part 5 | Miscellaneous | 100 |  | 
						
							
								| Obscure Exfiltration - Part 4 | Miscellaneous | 350 |  | 
						
							
								| Obscure Exfiltration - Part 3 | Miscellaneous | 350 |  | 
						
							
								| Obscure Exfiltration - Part 2 | Miscellaneous | 100 |  | 
						
							
								| Our community | Miscellaneous | 100 |  | 
						
							
								| Obscure Exfiltration - Part 1 | Miscellaneous | 100 |  | 
						
							
								| A long time ago in a honeypot far, far away... [part 4/5] | Network | 100 |  | 
						
							
								| A long time ago in a honeypot far, far away... [part 2/5] | Network | 100 |  | 
						
							
								| A long time ago in a honeypot far, far away... [part 1/5] | Network | 100 |  | 
						
							
								| Hidden Flag 2 | Crypto | 100 |  | 
						
							
								| Ransomware Simulation Challenge (2) | Reversing | 100 |  | 
						
							
								| The Summer of our Content | Miscellaneous | 250 |  | 
						
							
								| Last song | Miscellaneous | 100 |  | 
						
							
								| Relic of the Dark Web | Miscellaneous | 100 |  | 
						
							
								| Hiding in plain sight | Puzzle | 100 |  | 
						
							
								| Life Advice | Miscellaneous | 250 |  | 
						
							
								| Command and Scripting Interpreter | AppSec & DevSecOps | 150 |  | 
						
							
								| Hidden Flag 1 | Crypto | 100 |  | 
						
							
								| HTTP for fun | Network / Crypto | 250 |  | 
						
							
								| What is going on with my server! | Miscellaneous | 150 |  | 
						
							
								| Subsea cables | Legal | 50 |  | 
						
							
								| Do you need a downgrade first? | Web | 50 |  | 
						
							
								| International law in cyberspace | Legal | 50 |  | 
						
							
								| Confidence Building measures | Legal | 50 |  | 
						
							
								| Blackout Out in Milan (4/4) | Legal | 50 |  | 
						
							
								| Blackout Out in Milan (3/4) | Legal | 50 |  | 
						
							
								| Blackout Out in Milan (2/4) | Legal | 50 |  | 
						
							
								| Blackout Out in Milan (1/4) | Legal | 50 |  | 
						
							
								| Exfiltration in plain sight... | Forensics | 250 |  | 
						
							
								| Zip exfiltration | Forensics | 250 |  | 
						
							
								| Back to the Future [1/6] | Forensics | 50 |  | 
						
							
								| Oops... | Forensics | 300 |  | 
						
							
								| Boeing787 | AppSec & DevSecOps | 110 |  | 
						
							
								| Start Here | AppSec & DevSecOps | 100 |  | 
						
							
								| f-rust-rating | Reversing | 300 |  | 
						
							
								| Who am I? | Trivia | 100 |  | 
						
							
								| the Cypherpunk Torchbearer | Forensics | 173 |  | 
						
							
								| Can you answer? | Forensics | 53 |  | 
						
							
								| Maturity assessment | Miscellaneous | 10 |  | 
						
							
								| Data format for exchanging CTI information | Miscellaneous | 10 |  | 
						
							
								| Faster Than Light Speed Protocol (FLIP) | Miscellaneous | 10 |  | 
						
							
								| Malware history | Miscellaneous | 10 |  | 
						
							
								| Break it | Crypto | 50 |  | 
						
							
								| IP addressing | Network | 100 |  | 
						
							
								| Summer Computer | Hack.lu attendees | 90 |  | 
						
							
								| Simple Steganography 1 | Remediation | 100 |  | 
						
							
								| PCAPitalize on me | Network | 100 |  | 
						
							
								| Simple Reversing 3 | Reversing | 150 |  | 
						
							
								| Simple Reversing 2 | Reversing | 100 |  | 
						
							
								| Ransomware Simulation Challenge (4) | Reversing | 100 |  | 
						
							
								| Ransomware Simulation Challenge (3) | Reversing | 100 |  | 
						
							
								| Ransomware Simulation Challenge (1) | Reversing | 100 |  | 
						
							
								| Simple Reversing 1 | Reversing | 100 |  | 
						
							
								| Over | Reversing | 100 |  | 
						
							
								| Malicious Android App | Reversing | 100 |  |