Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| check the backups | TREASURE HUNT | 150 | |
| auditing | TREASURE HUNT | 100 | |
| exploration of the network capture | TREASURE HUNT | 150 | |
| Hiding in the "shadows" | Credential Extraction | 100 | |
| Remote Access | Remote Access | 500 | |
| the supsicous PDF | TREASURE HUNT | 100 | |
| Admin Access | Credential Extraction | 200 | |
| Credential Harvester | Credential Harvesting | 200 | |
| Time to inject SQL! | SQL Injection | 100 | |
| HTTP headers never lie! | Web Server Enumeration | 100 | |
| Hungry for breadcrumbs | HTML Page Inspection | 100 | |
| Hidden in plain sight | Stegonography | 200 |