|
Cipher Disk 1 - The Dressing Dynasty
|
Physical Challenges |
5 |
|
|
The Unchanging Identifier
|
Windows |
5 |
|
|
Environment Sleuth
|
Windows |
5 |
|
|
Redacted 2
|
Steganography |
10 |
|
|
Firewall Frenzy 2
|
Networking |
15 |
|
|
Headers Harvest 2-1
|
Forensics |
10 |
|
|
Headers Harvest 3-1
|
Forensics |
10 |
|
|
OSI 3: Subnet Suburb Shuffle
|
Misc |
15 |
|
|
Mazes
|
Misc |
15 |
|
|
Call of the WinAPI
|
Malware |
15 |
|
|
Autumn Leaves
|
Malware |
10 |
|
|
Who's Debugging
|
Reverse Engineering |
15 |
|
|
Wordsearch_3
|
Misc |
50 |
|
|
Where's Windows?
|
Windows |
5 |
|
|
What Am I Looking at Here?
|
Steganography |
5 |
|
|
Redacted 1
|
Reverse Engineering |
5 |
|
|
Breaking RSA
|
Cryptography |
30 |
|
|
I Am Not a Nerd
|
OSINT |
5 |
|
|
OSI 3
|
Networking |
15 |
|
|
Port Authority 1
|
Networking |
5 |
|
|
Firewall Frenzy 1
|
Networking |
5 |
|
|
Eicar
|
Malware |
5 |
|
|
Buggy
|
Malware |
5 |
|