furkan
80th place
2800 points
Awards
Solves
| Challenge | Category | Value | Time |
| MD5 | Hashing | 100 | |
| SHA1 | Hashing | 100 | |
| Backdoor6 | Miscellaneous | 100 | |
| SQLite Databases (Unencrypted) | Insecure Data Storage | 100 | |
| External Storage | Insecure Data Storage | 100 | |
| Internal Storage | Insecure Data Storage | 100 | |
| Activity data | Insecure Data Storage | 100 | |
| Shared Preferences | Insecure Data Storage | 100 | |
| Native Function Call | Binary Protection | 100 | |
| Hardcoded Secret | Binary Protection | 100 | |
| RPATH | Binary Protection | 100 | |
| Backdoor5 | Miscellaneous | 100 | |
| Backdoor4 | Miscellaneous | 100 | |
| Backdoor3 | Miscellaneous | 100 | |
| Backdoor2 | Miscellaneous | 100 | |
| Backdoor1 | Miscellaneous | 100 | |
| Caesar Cipher | Encryption | 100 | |
| File System Expose | Content Providers | 100 | |
| UDP Traffic | Non-HTTP Traffic | 100 | |
| TCP Traffic | Non-HTTP Traffic | 100 | |
| HTTPS Traffic | HTTP Traffic | 100 | |
| HTTP Traffic | HTTP Traffic | 100 | |
| WTF Logs | Logs | 100 | |
| Warnings Logs | Logs | 100 | |
| Verbose Logs | Logs | 100 | |
| Error Logs | Logs | 100 | |
| Debug Logs | Logs | 100 | |
| Informational Logs | Logs | 100 |