Exploit Final CTF, 0 / 0 (0%)
0% complete
Exploit MID CTF, 0 / 975 (0%)
0% complete
Exploit Sessions, 1,000 / 2,600 (38%)
38.461538461538% complete
Web Final CTF, 0 / 1,350 (0%)
0% complete
Web Mid CTF, 0 / 0 (0%)
0% complete
Web Sessions, 0 / 850 (0%)
0% complete
Web: Broken Access Control, 0 / 300 (0%)
0% complete
Web: Exotic Attacks, 0 / 700 (0%)
0% complete
Web: Framework & API Vulnerabilities, 0 / 400 (0%)
0% complete
Web: Securing Communication, 0 / 325 (0%)
0% complete
Web: Tools, 0 / 200 (0%)
0% complete
Total: 1,000 / 7,700 (13%)
Challenge Solved Points
Session 09: rwslotmachine1 (Exploit Sessions) #4, 4 hours, 9 minutes after release (2020-07-13 21:09:44) 100
Session 05: Neighbourly (Exploit Sessions) #10, 3 hours, 21 minutes after release (2020-07-01 20:21:55) 100
Session 05: Indexing (Exploit Sessions) #7, 2 hours, 11 minutes after release (2020-07-01 19:11:18) 100
Session 05: Parrot (Exploit Sessions) #6, 1 hour, 58 minutes after release (2020-07-01 18:58:21) 50
Session 04: Snooze me (Exploit Sessions) #11, 3 hours, 55 minutes after release (2020-06-29 20:55:27) 100
Session 04: Phone home (Exploit Sessions) #6, 3 hours, 54 minutes after release (2020-06-29 20:54:15) 100
Session 04: Call Me (Exploit Sessions) #12, 2 hours, 51 minutes after release (2020-06-29 19:51:36) 100
Session 04: Domino (Exploit Sessions) #6, 1 hour, 46 minutes after release (2020-06-29 18:46:34) 100
Session 04: Simple Password Protected Bash (Exploit Sessions) #8, 1 hour, 29 minutes after release (2020-06-29 18:29:55) 100
Session 02: Compiler Flags (Exploit Sessions) #15, 3 hours, 18 minutes after release (2020-06-24 20:18:02) 50
Session 02: Matryohska (Exploit Sessions) Third to solve this challenge! 3 hours, 17 minutes after release (2020-06-24 20:17:21) 100