Awards
Solves
Challenge | Category | Value | Time |
Log Analysis 3 | Log Analysis | 10 | |
Code Analysis | Web Exploit | 10 | |
DOM-Based XSS | Web 303 | 10 | |
Unsafe Deserialization | Web 303 | 10 | |
Timing Attack | Web 303 | 10 | |
JWT Token Manipulation | Web 303 | 10 | |
Prototype Pollution Demo | Web 303 | 10 | |
Unsafe eval() | Web 303 | 10 | |
Log Analysis 6 | Log Analysis | 10 | |
Pramuka | Cryptography | 10 | |
Log Analysis 4 | Log Analysis | 10 | |
Support Force | Web Exploit | 10 | |
Client-Side Privilege Escalation | Web 303 | 10 | |
ID-Networkers | Web Exploit | 10 | |
I’m Not Me, You Are Me | Web Exploit | 10 | |
Hidden Buy Flag | Web Exploit | 10 | |
jadi gini... | Forensic | 10 | |
Rot1Aoka | Cryptography | 10 | |
Forgot Encode | Welcome Flag | 10 |