The U.S. Navy Cyber Competition Team 2019 Assessment featured multi-discipline challenges spanning forensics, reverse engineering, and cryptography. Hosted on TryHackMe, these challenges test deep analytical skills from PCAP analysis to .NET decompilation to Enigma machine decryption.
Multi-stage PCAP challenge involving USB packet extraction with tshark, StegoVeritas embedded file discovery, ICMP data carving, cryptcat decryption using movie-reference keys from "The Net" (1995), and IRC server setup with InspIRCd to retrieve the flag from an automated bot.
.NET GUI reverse engineering challenge with 4 sliders. Decompile with Ghidra to find XOR-encrypted byte arrays and constraint-solving logic. Factor 711,000,000 into four integers summing to 711, then apply XOR decryption with the derived key to recover the 32-character hex flag.
Multi-layer forensics challenge chain: EXIF Morse code analysis, StegoVeritas trailing data extraction, password-protected ZIP archives, steghide with Matrix movie references, and Enigma machine decryption using historical rotor configuration (Gamma VI VII VIII, C-Thin reflector, 13 plugboard pairs).
Three-part progressive crypto challenge: (a) Dvorak-to-QWERTY keyboard substitution cipher revealing the key "dvorakdvorakdvorak", (b) Rail fence transposition with 5 rails starting from bottom, keyed by Charlotte's Web goose spelling "teerrrriiffiicccccc", and (c) Custom run-length binary encoding converting digit sequences to ASCII.