JSquared800
5th place
18165 points
Awards
Collaboration between users 1291 and 1304 on 899
15
Collaboration between users 1291 and 1304 on 892
10
Solves
Challenge | Category | Value | Time |
---|---|---|---|
Meeting Flag | Esoteric Languages | 50 | |
1 - Manipulate | Pwn | 150 | |
Anakin's PC | Password Cracking | 50 | |
Hashcat 2 | Password Cracking | 250 | |
Hashcat 1 | Password Cracking | 50 | |
Password Cracking Meeting Flag | Password Cracking | 50 | |
Crypto IV Meeting Flag | Crypto IV: Elliptic Curve Crypto | 50 | |
ROP 1 - ret2win v2 | PWN III (ROP) | 300 | |
PWN III Meeting Flag | PWN III (ROP) | 50 | |
Least eXciting Challenge | GOAD | 500 | |
Wide Open | GOAD | 200 | |
Updog | GOAD | 200 | |
Hot Potato | GOAD | 300 | |
Wildin | GOAD | 300 | |
Java Reversing 1.5 | Java Reverse Engineering | 200 | |
Java Meeting Flag | Java Reverse Engineering | 50 | |
Meme Machine | Web III | 250 | |
ssrf 4 | Web III | 250 | |
ssrf 3 | Web III | 200 | |
tux.tv | Web III | 150 | |
ssrf 2 | Web III | 150 | |
Shiny Button | Web III | 150 | |
Cowsay As A Service (CAAS) | Web III | 75 | |
Web III Meeting Flag | Web III | 50 | |
Meeting Flag | Welcome Back! | 100 | |
Meeting Flag | Networking Security | 50 | |
Pool 1 | Networking Security | 100 | |
Baby Wireshark Doo Doo Doo | Networking Security | 100 | |
File Transfer | Networking Security | 50 | |
Make a Difference | Forensics I | 100 | |
Generate MD5 Hash | Password Cracking | 25 | |
xxd | Forensics I | 20 | |
Just Another Logo | Forensics I | 20 | |
Meeting Flag | Forensics I | 50 | |
Meeting Flag | Ethics and Law | 50 | |
Pyjail 5 | Python Jails | 300 | |
Pyjail 4 | Python Jails | 250 | |
Pyjail 3 | Python Jails | 200 | |
Pyjail 2 | Python Jails | 200 | |
Pyjail 1 | Python Jails | 150 | |
Meeting Flag | Python Jails | 50 | |
Totient Turmoil | Crypto I | 150 | |
Password Cracking | Password Cracking | 150 | |
Crypto I Meeting Flag | Crypto I | 50 | |
Vigenère Visionary | Crypto I | 100 | |
PwnyMart | PWN I | 250 | |
Bug Bounty 5 | PWN I | 300 | |
Bug Bounty 4 | PWN I | 250 | |
Bug Bounty 3 | PWN I | 200 | |
Bug Bounty 2 | PWN I | 150 | |
Bug Bounty 1 | PWN I | 100 | |
PWN I Meeting Flag | PWN I | 50 | |
Clear Lock | Physical Security | 50 | |
Master Lock 140 | Physical Security | 150 | |
Master Lock No. 3 or 5 | Physical Security | 100 | |
Lockpicking Meeting Flag | Lockpicking | 50 | |
XSS 3 | Web II | 300 | |
Format String Quiz | PWN II (Format) | 100 | |
0 - Overflow | Pwn | 100 | |
Format 0 | Pwn | 50 | |
Meeting Flag | Opsec | 50 | |
Crackme 2 | Reverse Engineering II | 150 | |
debugger | Reverse Engineering II | 200 | |
2 - asm leaver | x86_64 Assembly | 150 | |
1 - asm adder | x86_64 Assembly | 100 | |
SUPERMEGACORP - Day 2 | Reverse Engineering II | 100 | |
SUPERMEGACORP - Day 1 | Reverse Engineering II | 50 | |
Buried in the Sand | Reverse Engineering II | 50 | |
RE II Meeting Flag | Reverse Engineering II | 50 | |
Assembly Meeting Flag | x86_64 Assembly | 50 | |
slowpoke | Reverse Engineering I | 300 | |
dialogue speed | Reverse Engineering I | 300 | |
Flag Generator | Reverse Engineering I | 300 | |
Python RE 2 Challenge Store | Reverse Engineering I | 225 | |
Reverse Engineering I Meeting Flag | Reverse Engineering I | 50 | |
rot13 | Rev | 100 | |
first_re | Rev | 100 | |
basic64 | Reverse Engineering I | 100 | |
Java Reversing 1 | Java Reverse Engineering | 100 | |
Diophantine Basics | Rev | 100 | |
Crackme 1 | Reverse Engineering II | 100 | |
Python RE 1 Easy rev | Reverse Engineering I | 75 | |
Crackme 0.5 | Reverse Engineering II | 75 | |
Crackme 0 | Reverse Engineering II | 50 | |
A Ratty Investigation 6 | OSINT I | 100 | |
A Ratty Investigation 8 | OSINT I | 100 | |
A Ratty Investigation 4 | OSINT I | 100 | |
A Ratty Investigation 7 | OSINT I | 100 | |
A Ratty Investigation 5 | OSINT I | 100 | |
A Ratty Investigation 2 | OSINT I | 100 | |
A Ratty Investigation 1 | OSINT I | 100 | |
OSINT Waiver | OSINT I | 10 | |
Layer 7 | Networking Security | 75 | |
Layer 6 | Networking Security | 75 | |
Layer 4 | Networking Security | 50 | |
Layer 3 | Networking Security | 50 | |
Layer 2 | Networking Security | 30 | |
Layer 1 | Networking Security | 30 | |
OSINT I Meeting Flag | OSINT I | 50 | |
Bobby Tables | Web II | 300 | |
SQL Injection 2 | Web II | 250 | |
Web II Meeting Flag | Web II | 50 | |
XSS 2 | Web II | 200 | |
ssrf 1 | Web III | 100 | |
XSS 1 | Web II | 100 | |
Budget Dalle | Web III | 100 | |
Technically RSA | Crypto II | 200 | |
Web I Meeting Flag | Web I | 50 | |
Integer Overflow | PWN I | 150 | |
New Intern 3 | Web I | 200 | |
New Intern 2 | Web I | 100 | |
Are ya wiening son? | Crypto | 350 | |
Secret Salad | Crypto | 100 | |
Word Counter III | Web III | 75 | |
Word Counter I | Web III | 75 | |
Word Counter II | Web | 75 | |
The Source of Your Problems | Web I | 50 | |
SQL Injection 1 | Web II | 100 | |
Path To Success | Web I | 50 | |
Inspect Me 8 | Web I | 50 | |
Inspect Me 7 | Web I | 50 | |
Inspect Me 6 | Web I | 50 | |
Inspect Me 5 | Web I | 50 | |
Inspect Me 4 | Web I | 50 | |
Inspect Me 3 | Web I | 50 | |
Inspect Me 2 | Web I | 50 | |
Inspect Me 1 | Web I | 50 | |
New Intern 1 | Web I | 25 | |
Decision Day 4 | Web I | 25 | |
Decision Day 3 | Web I | 25 | |
Decision Day 2 | Web I | 25 | |
Decision Day 1 | Web I | 25 | |
Pyjail 0.5 | Python Jails | 30 | |
Calculator Escape 0 | Jail | 25 | |
Pyjail 0 | Python Jails | 20 | |
VIM Quiz | Misc | 100 | |
Find Spoingus 4 | OSINT I | 100 | |
Find Spoingus 3 | OSINT I | 100 | |
Find Spoingus 2 | OSINT I | 100 | |
Find Spoingus 1 | OSINT I | 100 | |
First XOR | Crypto I | 50 | |
Maze God | Intro to Terminal and Setup | 500 | |
bandit12 | Intro to Terminal and Setup | 20 | |
bandit11 | Intro to Terminal and Setup | 20 | |
bandit10 | Intro to Terminal and Setup | 20 | |
bandit09 | Intro to Terminal and Setup | 20 | |
bandit08 | Intro to Terminal and Setup | 20 | |
bandit07 | Intro to Terminal and Setup | 20 | |
bandit06 | Intro to Terminal and Setup | 20 | |
bandit05 | Intro to Terminal and Setup | 20 | |
bandit04 | Intro to Terminal and Setup | 20 | |
bandit03 | Intro to Terminal and Setup | 20 | |
bandit02 | Intro to Terminal and Setup | 20 | |
bandit01 | Intro to Terminal and Setup | 20 | |
A Very Special Character 2 | Intro to Terminal and Setup | 30 | |
netcat | Intro to Terminal and Setup | 20 | |
Shell Basics 6 - Environment Variables | Intro to Terminal and Setup | 20 | |
Shell Basics 5.3 - File To stdin | Intro to Terminal and Setup | 20 | |
Shell Basics 5.2 - Pipe Output From Script | Intro to Terminal and Setup | 20 | |
Shell Basics 5.1 - Pipe Output | Intro to Terminal and Setup | 20 | |
Shell Basics 4 - Hidden Files | Intro to Terminal and Setup | 20 | |
Shell Basics 3 - Terminate | Intro to Terminal and Setup | 20 | |
Shell Basics 2 - Read Files | Intro to Terminal and Setup | 20 | |
Shell Basics 1 - Tab Completion | Intro to Terminal and Setup | 20 | |
Shell Basics 0 | Intro to Terminal and Setup | 20 | |
A Very Special Character | Intro to Terminal and Setup | 20 | |
bandit00 | Intro to Terminal and Setup | 20 | |
the-library-5 | Intro to Terminal and Setup | 50 | |
the-library-4 | Intro to Terminal and Setup | 50 | |
the-library-3 | Intro to Terminal and Setup | 50 | |
the-library-2 | Intro to Terminal and Setup | 50 | |
the-library-1 | Intro to Terminal and Setup | 50 | |
Setup Meeting Flag | Intro to Terminal and Setup | 50 | |
Language Identification | Esoteric Languages | 50 | |
CryptoHack Level 6 | CryptoHack | 110 | |
CryptoHack Level 5 | CryptoHack | 80 | |
CryptoHack Level 4 | CryptoHack | 60 | |
CryptoHack Level 3 | CryptoHack | 40 | |
CryptoHack Level 2 | CryptoHack | 20 | |
CryptoHack Level 1 | CryptoHack | 10 | |
Welcome to SIGPwny! | Welcome | 50 | |
SIGPwny Discord | Welcome | 50 | |
Discord Authentication | Welcome | 50 |