Exploit Final CTF, 0 / 0 (0%)
0% complete
Exploit MID CTF, 0 / 975 (0%)
0% complete
Exploit Sessions, 1,000 / 2,600 (38%)
38.461538461538% complete
Web Final CTF, 0 / 1,350 (0%)
0% complete
Web Mid CTF, 0 / 0 (0%)
0% complete
Web Sessions, 0 / 850 (0%)
0% complete
Web: Broken Access Control, 0 / 300 (0%)
0% complete
Web: Exotic Attacks, 0 / 700 (0%)
0% complete
Web: Framework & API Vulnerabilities, 0 / 400 (0%)
0% complete
Web: Securing Communication, 0 / 325 (0%)
0% complete
Web: Tools, 0 / 200 (0%)
0% complete
Total: 1,000 / 7,700 (13%)
Challenge Solved Points
Session 09: rwslotmachine1 (Exploit Sessions) First to solve this challenge! 3 hours, 55 minutes after release (2020-07-13 20:55:59) 100
Session 05: Neighbourly (Exploit Sessions) #7, 3 hours, 17 minutes after release (2020-07-01 20:17:06) 100
Session 05: Indexing (Exploit Sessions) #5, 2 hours, 3 minutes after release (2020-07-01 19:03:23) 100
Session 05: Parrot (Exploit Sessions) #5, 1 hour, 54 minutes after release (2020-07-01 18:54:47) 50
Session 04: Phone home (Exploit Sessions) #4, 3 hours, 12 minutes after release (2020-06-29 20:12:04) 100
Session 04: Snooze me (Exploit Sessions) #4, 3 hours after release (2020-06-29 20:00:50) 100
Session 04: Call Me (Exploit Sessions) Third to solve this challenge! 2 hours, 30 minutes after release (2020-06-29 19:30:59) 100
Session 04: Domino (Exploit Sessions) #5, 1 hour, 43 minutes after release (2020-06-29 18:43:20) 100
Session 04: Simple Password Protected Bash (Exploit Sessions) #5, 1 hour, 27 minutes after release (2020-06-29 18:27:45) 100
Session 02: Matryohska (Exploit Sessions) First to solve this challenge! 3 hours, 15 minutes after release (2020-06-24 20:15:58) 100
Session 02: Compiler Flags (Exploit Sessions) #5, 2 hours, 10 minutes after release (2020-06-24 19:10:44) 50