furkan
76th place
2800 points
Awards
Solves
Challenge | Category | Value | Time |
MD5 | Hashing | 100 | |
SHA1 | Hashing | 100 | |
Backdoor6 | Miscellaneous | 100 | |
SQLite Databases (Unencrypted) | Insecure Data Storage | 100 | |
External Storage | Insecure Data Storage | 100 | |
Internal Storage | Insecure Data Storage | 100 | |
Activity data | Insecure Data Storage | 100 | |
Shared Preferences | Insecure Data Storage | 100 | |
Native Function Call | Binary Protection | 100 | |
Hardcoded Secret | Binary Protection | 100 | |
RPATH | Binary Protection | 100 | |
Backdoor5 | Miscellaneous | 100 | |
Backdoor4 | Miscellaneous | 100 | |
Backdoor3 | Miscellaneous | 100 | |
Backdoor2 | Miscellaneous | 100 | |
Backdoor1 | Miscellaneous | 100 | |
Caesar Cipher | Encryption | 100 | |
File System Expose | Content Providers | 100 | |
UDP Traffic | Non-HTTP Traffic | 100 | |
TCP Traffic | Non-HTTP Traffic | 100 | |
HTTPS Traffic | HTTP Traffic | 100 | |
HTTP Traffic | HTTP Traffic | 100 | |
WTF Logs | Logs | 100 | |
Warnings Logs | Logs | 100 | |
Verbose Logs | Logs | 100 | |
Error Logs | Logs | 100 | |
Debug Logs | Logs | 100 | |
Informational Logs | Logs | 100 |