Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| Intruded? | Cryptography | 150 | |
| Misinterpreted | Reverse Engineering | 250 | |
| Hijack | Web Exploitation | 200 | |
| Silent Palette | Forensics | 175 | |
| Dots, Dashes, and Decryption | Forensics | 125 | |
| Artifact | Forensics | 175 |
| Challenge | Category | Value | Time |
|---|---|---|---|
| Intruded? | Cryptography | 150 | |
| Misinterpreted | Reverse Engineering | 250 | |
| Hijack | Web Exploitation | 200 | |
| Silent Palette | Forensics | 175 | |
| Dots, Dashes, and Decryption | Forensics | 125 | |
| Artifact | Forensics | 175 |