Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| LFI via Debug Console | Web Exploitation | 10 | |
| Homepage Hijinks | Forensics | 5 | |
| Command Injection Terminal | Web Exploitation | 10 | |
| Return of the Metadata | Reverse Engineering | 10 | |
| Buff-er What? | Binary Exploitation | 10 | |
| HID-den Capture | Binary Exploitation | 10 | |
| Wireshark D | Web Security | 5 | |
| Wireshark 13 | Web Security | 10 | |
| Wireshark B | Web Security | 10 | |
| Wordsearch | Programming | 5 | |
| Slithery Snake | Programming | 5 | |
| Shuffle up, down, and all around | Reverse Engineering | 5 | |
| Broken HTTPS? | Web Security | 10 | |
| Gain Access | 0 |