[M] File Path
|
BBJA Web Privilege Escalation |
25 |
|
[M] Secret
|
BBJA Web Privilege Escalation |
25 |
|
SURVEY!
|
SURVEY! |
100 |
|
[M] Medium
|
OSINT |
60 |
|
[E] Easy
|
OSINT |
20 |
|
[H] Decrpytion
|
Reverse Engineering Malware |
50 |
|
[E] Question #7
|
LoRa Radio Interception |
10 |
|
[E] Question #4
|
LoRa Radio Interception |
10 |
|
[E] Question #5
|
LoRa Radio Interception |
10 |
|
[E] Question #9
|
LoRa Radio Interception |
10 |
|
[E] Question #8
|
LoRa Radio Interception |
10 |
|
[H] Digital Signature
|
Digital Boarding Pass |
50 |
|
[H] Flight Code
|
Digital Boarding Pass |
25 |
|
[H] Full Name
|
Digital Boarding Pass |
15 |
|
[M] OPERATOR
|
EVENT: Operation Swarm |
30 |
|
[M] PROTOCOL
|
EVENT: Operation Swarm |
30 |
|
URB Bus ID
|
HID Challenge |
10 |
|
Malicious Device Address
|
HID Challenge |
10 |
|
Type of Protocol
|
HID Challenge |
10 |
|
Mouse Address
|
HID Challenge |
10 |
|
[E] Question #2
|
LoRa Radio Interception |
10 |
|
[E] Question #1
|
LoRa Radio Interception |
10 |
|
[H] OS
|
Digital Boarding Pass |
10 |
|
[M] Admin Email
|
BBJA Web Privilege Escalation |
25 |
|
[E] Victim's Email Address
|
Traffic Analysis |
10 |
|
[E] Attacker's IP Address
|
Traffic Analysis |
10 |
|
[E] Victim's IP Address
|
Traffic Analysis |
10 |
|
[M] Nonce
|
Reverse Engineering Malware |
40 |
|
[M] Key
|
Reverse Engineering Malware |
40 |
|
[M] Target Directory
|
Reverse Engineering Malware |
40 |
|
[E] Encoding Type
|
Reverse Engineering Malware |
10 |
|
[E] Programming Language
|
Reverse Engineering Malware |
10 |
|
[E] Program Name
|
Reverse Engineering Malware |
10 |
|