Exploit Final CTF, 0 / 0 (0%)
0% complete
Exploit MID CTF, 0 / 975 (0%)
0% complete
Exploit Sessions, 900 / 2,600 (35%)
34.615384615385% complete
Web Final CTF, 0 / 1,350 (0%)
0% complete
Web Mid CTF, 0 / 0 (0%)
0% complete
Web Sessions, 0 / 850 (0%)
0% complete
Web: Broken Access Control, 0 / 300 (0%)
0% complete
Web: Exotic Attacks, 0 / 700 (0%)
0% complete
Web: Framework & API Vulnerabilities, 0 / 400 (0%)
0% complete
Web: Securing Communication, 0 / 325 (0%)
0% complete
Web: Tools, 0 / 200 (0%)
0% complete
Total: 900 / 7,700 (11.7%)
Challenge Solved Points
Session 09: rwslotmachine1 (Exploit Sessions) Third to solve this challenge! 4 hours, 3 minutes after release (2020-07-13 21:03:42) 100
Session 05: Neighbourly (Exploit Sessions) #15, 3 hours, 27 minutes after release (2020-07-01 20:27:51) 100
Session 05: Indexing (Exploit Sessions) #15, 2 hours, 27 minutes after release (2020-07-01 19:27:59) 100
Session 05: Parrot (Exploit Sessions) #14, 2 hours, 24 minutes after release (2020-07-01 19:24:12) 50
Session 04: Snooze me (Exploit Sessions) #8, 3 hours, 28 minutes after release (2020-06-29 20:28:17) 100
Session 04: Call Me (Exploit Sessions) #4, 2 hours, 31 minutes after release (2020-06-29 19:31:12) 100
Session 04: Domino (Exploit Sessions) Second to solve this challenge! 1 hour, 41 minutes after release (2020-06-29 18:41:10) 100
Session 04: Simple Password Protected Bash (Exploit Sessions) Third to solve this challenge! 1 hour, 21 minutes after release (2020-06-29 18:21:02) 100
Session 02: Matryohska (Exploit Sessions) #4, 3 hours, 42 minutes after release (2020-06-24 20:42:12) 100
Session 02: Compiler Flags (Exploit Sessions) #4, 2 hours, 9 minutes after release (2020-06-24 19:09:13) 50