Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| Compromised | Web Exploitation | 200 | |
| Picture Perfect | Cryptography | 175 | |
| Hijack | Web Exploitation | 200 | |
| Artifact | Forensics | 175 |
| Challenge | Category | Value | Time |
|---|---|---|---|
| Compromised | Web Exploitation | 200 | |
| Picture Perfect | Cryptography | 175 | |
| Hijack | Web Exploitation | 200 | |
| Artifact | Forensics | 175 |