Tanveer5911
10th place
625 points
Awards
Solves
| Challenge | Category | Value | Time |
| Examine | Reverse Engineering | 25 | |
| JohnCena | Reverse Engineering | 25 | |
| The problem was based ! | Cryptography | 25 | |
| The horse | Reverse Engineering | 50 | |
| What It Do | Forensics | 25 | |
| On the web | WebEx | 25 | |
| The payload | WebEx | 50 | |
| DB Inject | WebEx | 25 | |
| IPs | WebEx | 50 | |
| Who are they | WebEx | 50 | |
| domain | Forensics | 25 | |
| pcap | Forensics | 50 | |
| header | Forensics | 25 | |
| zip | Forensics | 50 | |
| walk | Forensics | 50 | |
| file_types | Forensics | 25 | |
| strings | Forensics | 25 | |
| metadata | Forensics | 25 |