amiao.jerick
Students - Third Year Students
120th place
510 points
Solves
Challenge | Category | Value | Time |
---|---|---|---|
Echoes in the Login | Cybersecurity | 20 | |
The Secret Code : Web Exploitation/Cryptography | Cybersecurity | 10 | |
Flag Hunt: Console Mode | Cybersecurity | 20 | |
Pinpoint Pursuit: Geolocation Challenge 🌎 | Cybersecurity | 10 | |
Binary Spectrum Secrets | Cybersecurity | 20 | |
Hidden in Plain Sight: Shrek’s Mystery | Cybersecurity | 10 | |
IT Career Decisions: A Research-Driven Approach | Research | 10 | |
Packet Tracer Flag Hunt🚩 | Networking | 10 | |
Research Mind | Research | 10 | |
Where am I? | Cybersecurity | 10 | |
CodeBreak UX | UI/UX Design | 20 | |
NTLM: Not Too Legit, Man | Cybersecurity | 20 | |
Research Defense | Research | 10 | |
The Subnet Sleuth: Subnetting Basics | Networking | 10 | |
What Went Wrong? | UI/UX Design | 10 | |
Rich Graphics Brief | UI/UX Design | 10 | |
Parallel Arrays | Computer Programming 2 - Arrays | 10 | |
UI Spy | UI/UX Design | 50 | |
Folder Quest | Cybersecurity | 20 | |
Caesar Cipher | Cybersecurity | 100 | |
Retro Dial: Press to Decode | Cybersecurity | 20 | |
TubeCheck! | Research | 100 |