| Name | Points | Tags | Writeups | |
|---|---|---|---|---|
| Welcome Letter | 20 | welcome | 0 | |
| Security report | 500 | web crypto | 1 | |
| EPES 2 | 500 | standard crypto | 2 | |
| Red teaming | 500 | social-engineering osint | 1 | |
| Firmware update | 500 | reverse-engineering crypto | 6 | |
| Sightseeing again | 400 | osint | 1 | |
| Exposed webcam | 400 | webcam | 2 | |
| Security advisory | 400 | crypto | 1 | |
| _duplicate_ | 0 | |||
| Contact card | 400 | malware | 3 | |
| Key generator | 300 | reverse-engineering | 8 | |
| Stolen licenses | 300 | ocr checksum | 4 | |
| HID | 300 | binary-analysis | 4 | |
| Screenshot | 300 | image-analysis | 4 | |
| Leak audit | 200 | sql | 9 | |
| Bash history | 200 | forensics | 4 | |
| Security.txt | 200 | best-practices | 3 | |
| Change | 200 | forensics | 5 | |
| Security headers | 100 | web | 7 | |
| DoS attack | 100 | packet-analysis | 5 | |
| Ladder password | 100 | plc-programming | 2 | |
| Redacted news | 100 | forensics | 8 | |
| Check digit | 25 | standard | 3 | |
| Security framework | 25 | standard framework | 3 | |
| Deadly malware | 25 | malware | 3 | |
| Vulnerable RTOS | 25 | vulnerability | 4 | |
| Welcome letter | 20 | reading | 5 | |