STA Anderdingus Associates
5th place
750 points
Members
| User Name | Score |
|---|---|
| STA Anderdingus Associates GB | 375 |
| STA Anderdingus Associates TS | 240 |
| STA Anderdingus Associates AS | 120 |
| STA Anderdingus Associates MB | 15 |
Solves
| Challenge | Category | Value | Time |
|---|---|---|---|
| Micro:bit 2 | Physical Challenge | 5 | |
| Revenge of the Shell | Kali Attack | 35 | |
| The Oracle's Prediction | Steganography | 20 | |
| Trust Nothing | Network Exploitation | 50 | |
| Worst Admin Ever | Steganography | 15 | |
| Solo | Cryptography | 25 | |
| 2:30pm Challenge Drop | Challenge Drop | 5 | |
| Knock Knock | Network Exploitation | 20 | |
| Needle vs Haystack | Kali Student | 10 | |
| Classics chapter | Misc | 10 | |
| Cronic Execution 2 | Kali Student | 10 | |
| Cronic Execution 1 | Kali Student | 15 | |
| What's for Breakfast | Cryptography | 30 | |
| Overflow101 | Kali Student | 25 | |
| Secure Login 3000 | Kali Student | 15 | |
| Port Authority 3 | OSINT | 10 | |
| Write Your Own Path | Kali Student | 15 | |
| Group Me | Kali Student | 10 | |
| Don't Tell Me | Win7 | 10 | |
| Book Worm | Win7 | 15 | |
| Hashbrowns 3 | Cryptography | 5 | |
| Micro:bit 1 | Physical Challenge | 5 | |
| Too Powerful | Kali Student | 15 | |
| Uninvited Query 4 | Networking | 20 | |
| Traceroute 3 | Networking | 15 | |
| Traceroute 2 | Networking | 10 | |
| Traceroute 1 | Networking | 5 | |
| Cracked 4 | Networking | 25 | |
| Cracked 3 | Networking | 10 | |
| Cracked 2 | Networking | 30 | |
| Cracked 1 | Networking | 15 | |
| Uninvited Query 3 | Networking | 20 | |
| Uninvited Query 2 | Networking | 10 | |
| Uninvited Query 1 | Networking | 15 | |
| Silent Control 4 | Networking | 25 | |
| Silent Control 3 | Networking | 30 | |
| Silent Control 2 | Networking | 10 | |
| Silent Control 1 | Networking | 10 | |
| Fools Flag | Misc | 50 | |
| What a word | Misc | 5 | |
| Explore the Data 2 | OSINT | 10 | |
| Explore the Data 1 | OSINT | 10 | |
| Port Authority 2 | OSINT | 10 | |
| Port Authority 1 | OSINT | 10 | |
| Hypertext 2 | Misc | 5 | |
| Layered Security Approach | Cryptography | 15 | |
| Hashbrowns 2 | Cryptography | 10 | |
| Gain Access | 0 |