Switch to lite version Switch to dark theme

About eko

Usernameeko
CountryCanada
Member since2014-02-09
Coins0
Points189
Write-up with special mention0
Ranking343 / 50557
Challenges completed67 / 396

Datapornstar

Challenge Write-up with special mention
Validation date Challenge Number of points
2018-05-30 15:52:12
Jail Escaping
C Jail 4
5
2018-05-29 21:57:04
Jail Escaping
C Jail 3
3
2018-05-29 21:09:47
Jail Escaping
C Jail 2
2
2018-05-29 21:07:09
Jail Escaping
C Jail 1
1
2018-05-29 02:58:14
Reverse Engineering
Can I speak with the kernel?
5
2018-05-28 17:08:57
Reverse Engineering
WASM Part 1
5
2018-05-21 22:45:39
Reverse Engineering
Intro To Sparc
3
2018-05-21 22:36:41
Reverse Engineering
Heap allocator
3
2014-04-12 17:39:37
Forensics
2 / 3 Did you see my desktop?
3
2014-04-12 17:39:22
Forensics
1 / 3 Do not waste the environment
2
2014-04-12 17:38:53
Forensics
3 / 3 Suspicious account password?
4
2014-04-08 19:02:18
Reverse Engineering
Can you see through the star
2
2014-03-22 21:21:17
SysAdmin Linux
SysAdmin Part 7
4
2014-03-22 20:50:51
SysAdmin Linux
SysAdmin Part 6
3
2014-03-16 16:06:50
Jail Escaping
PyJail 3
6
2014-03-15 18:52:40
Jail Escaping
PyJail 2
5
2014-03-15 18:01:39
Jail Escaping
PyJail 1
3
2014-03-14 20:33:21
SysAdmin Linux
SysAdmin Part 1
1
2014-03-02 12:50:37
Pwnage Linux
Level3 Pwnage Linux Level Up
3
2014-03-02 11:06:55
Web
XPATH of hell!
7
2014-03-01 22:19:39
Web
I hate this one
6
2014-03-01 18:31:39
Web
Malicious upload
2
2014-03-01 02:24:27
Pwnage Linux
Level2 Pwnage Linux Level Up
2
2014-03-01 01:13:40
Pwnage Linux
Level1 Pwnage Linux Level Up
1
2014-02-26 20:59:36
Cryptography
Encrypted Zip
4
2014-02-26 19:53:55
Web
Security thru obscurity!
2
2014-02-26 19:27:45
Steganography
Victor you're hidding me something
1
2014-02-26 19:26:47
Steganography
Victor reloaded
2
2014-02-25 19:04:02
Web
Looking for the flag?
3
2014-02-25 18:40:06
Web
Looking for password file
1
2014-02-23 21:46:19
Reverse Engineering
Kernel introduction
3
2014-02-23 21:36:47
Reverse Engineering
Need a client
6
2014-02-23 02:00:37
Reverse Engineering
Back to our roots
5
2014-02-23 00:57:51
Steganography
Look inside the house
2
2014-02-22 20:56:50
Reverse Engineering
Windows API for the win
4
2014-02-21 18:06:50
Forensics
Hide my ass in my home!
2
2014-02-20 22:39:49
Coding Challenges
I saw a little elf
4
2014-02-19 20:32:10
Forensics
Are you Twisted Insane?
3
2014-02-18 22:27:16
Forensics
Hey Chuck where is the flag?
2
2014-02-18 22:14:41
Reverse Engineering
Introduction to MIPS
3
2014-02-18 21:25:16
Reverse Engineering
Introduction to ARM
4
2014-02-18 21:00:42
Forensics
Spy my girl
5
2014-02-18 18:33:48
Coding Challenges
Hash breaker reloaded
5
2014-02-18 18:23:55
Coding Challenges
Hash breaker
4
2014-02-17 18:57:58
Cryptography
I Lost my password
3
2014-02-16 22:35:50
Cryptography
Public key recovery
2
2014-02-16 22:11:46
Cryptography
File recovery
1
2014-02-16 20:31:12
Web
Area 51
1
2014-02-16 19:35:52
Web
Serial killer!
3
2014-02-16 18:16:29
Web
Words mean something?
1
2014-02-16 17:14:04
SQL Injection
Po po po po postgresql
2
2014-02-16 17:03:05
SQL Injection
ACL rulezzz the world.
2
2014-02-15 20:53:42
Coding Challenges
I hate mathematics
3
2014-02-15 20:22:41
Coding Challenges
Hash me reloaded
3
2014-02-15 20:01:54
Coding Challenges
Hash me please
2
2014-02-15 19:39:12
Web
Headache
1
2014-02-15 19:38:04
JavaScript
Why not?
2
2014-02-15 19:28:27
JavaScript
Then obfuscation is more secure
1
2014-02-15 18:14:18
Reverse Engineering
Crack Me 1
3
2014-02-15 16:30:36
Reverse Engineering
Windows x86 reversing is cool
3
2014-02-15 15:44:54
Reverse Engineering
I never forget the Nintendo 64
3
2014-02-15 15:05:10
SQL Injection
Most basic SQLi pattern.
1
2014-02-15 10:24:09
JavaScript
Hashing is more secure
1
2014-02-15 10:22:57
JavaScript
Client side validation is bad!
1
2014-02-15 10:12:09
Cryptography
Some martian message
1
2014-02-08 01:35:03
Forensics
I made a dd of Agent Smith usb key
1
2014-02-08 00:31:45
Reverse Engineering
Time to learn x86 ASM & gdb
2
top