|
Cipher Disk 1 - The Dressing Dynasty
|
Physical Challenges |
5 |
|
|
Headers Harvest 1
|
Misc |
5 |
|
|
Quiet Harvest
|
Malware |
10 |
|
|
The Unchanging Identifier
|
Windows |
5 |
|
|
Environment Sleuth
|
Windows |
5 |
|
|
Rendezvous Redirect
|
Cryptography |
10 |
|
|
T9 Texting
|
Forensics |
10 |
|
|
Redacted 2
|
Steganography |
10 |
|
|
Catch Me If You Can
|
OSINT |
10 |
|
|
Firewall Frenzy 2
|
Networking |
15 |
|
|
Firewall Frenzy 3
|
Networking |
15 |
|
|
Headers Harvest 2-1
|
Forensics |
10 |
|
|
That's Not Bunny
|
OSINT |
10 |
|
|
Headers Harvest 3-1
|
Forensics |
10 |
|
|
OSI 3: Subnet Suburb Shuffle
|
Misc |
15 |
|
|
Mazes
|
Misc |
15 |
|
|
Stacking Towers
|
Misc |
15 |
|
|
Get Out of My Swamp
|
OSINT |
10 |
|
|
Order of Operations 2
|
Math |
10 |
|
|
Call of the WinAPI
|
Malware |
15 |
|
|
Fun with PGP Keys
|
OSINT |
10 |
|
|
Autumn Leaves
|
Malware |
10 |
|
|
Port Authority 3
|
OSINT |
10 |
|
|
Port Authority 2
|
OSINT |
10 |
|
|
Scan Me Maybe
|
Forensics |
10 |
|
|
Who's Debugging
|
Reverse Engineering |
15 |
|
|
Wordsearch_3
|
Misc |
50 |
|
|
Wordsearch_2
|
Misc |
10 |
|
|
Where's Windows?
|
Windows |
5 |
|
|
What Am I Looking at Here?
|
Steganography |
5 |
|
|
Redacted 1
|
Reverse Engineering |
5 |
|
|
Wordsearch_1
|
Misc |
5 |
|
|
Play Ball
|
OSINT |
5 |
|
|
Windows File Extensions
|
Steganography |
5 |
|
|
Breaking RSA
|
Cryptography |
30 |
|
|
Windows Weirdness
|
Windows |
10 |
|
|
I Am Not a Nerd
|
OSINT |
5 |
|
|
Maze
|
Misc |
10 |
|
|
OSI 3
|
Networking |
15 |
|
|
Start Digging
|
Forensics |
5 |
|
|
Logic Chamber
|
Misc |
5 |
|
|
What's the code?
|
Misc |
5 |
|
|
Counting Cards
|
Math |
10 |
|
|
Ancient Ciphers
|
Cryptography |
5 |
|
|
Password Pandemonium
|
Cryptography |
5 |
|
|
Headers Harvest 3
|
Misc |
5 |
|
|
Login Storm
|
Forensics |
10 |
|
|
??
|
Misc |
5 |
|
|
Headers Harvest 2
|
Misc |
5 |
|
|
Port Authority 1
|
Networking |
5 |
|
|
Diamonds
|
Math |
10 |
|
|
Firewall Frenzy 1
|
Networking |
5 |
|
|
Triangle
|
Math |
10 |
|
|
Maps
|
Math |
5 |
|
|
Eicar
|
Malware |
5 |
|
|
Cards
|
Math |
5 |
|
|
Order of Operations 1
|
Math |
5 |
|
|
Buggy
|
Malware |
5 |
|
|
The Godfather
|
Malware |
5 |
|
|
Funumbers
|
Cryptography |
5 |
|
|
Gain Access
|
|
0 |
|