Question | Answer |
challenges that cover different types of encryption | crypto | the use of tools to examine the binary code of a program | Binary analysis | examination of a file or computer system to search for evidence of a crime (for example) | Forensics | challenges that cover websites and web protocols, web browsers, etc. | Web | command-line challenges | Bash/CLI |