This file contains coordinates of all hidden chests
The name of the chest do NOT matter
Download the server .zip file from here
TRACK1: RIGHT TRACK
signed by: PRATZ01
SRNO | QUESTION | ANSWER | NEXT CLUE | COOD |
1 | What Git command moves changes from one branch to another without merging? | Rebase | Golden spires reach for the sky, Where kings and queens once walked by. A grand estate with towers tall, Find the chest near the entrance hall |
700, 105,-1096 |
2 | What common network security protocol encrypts web traffic? | TLS | Once it roamed the ocean wide, Now it rests by the riverside. |
678,120-863 |
3 | What Linux command shows disk space usage in human-readable form? | df | Follow the color made of red n yellow | 544,109,-968 |
4 | What CPU cache level is closest to the processor core? | L1 | In the middle of forest find the cozy home in Matterhorn Sign | 644,109,-1060 |
5 | What exact function in C dynamically allocates memory but does not initialize it? | malloc | Your next clue deep inside the snowy hills, near the barrels i stand alone. | 669,102,-1193 |
6 | What rarely discussed but real-world issue causes CPUs to operate at incorrect voltages due to aging | degradation | Deep Inside The kitchen within the hills secret rooms is where u will find the next clue | 606,115,-1177 |
7 | What little-known but correct method forces garbage collection in JavaScript | WeakRef | On top of The highest mountain | 585,105,-1140 |
8 | What obscure attack technique manipulates row refresh operations in DRAM to cause bit flips? | hammer | Go back track to ur progress and find blocks of emeralds | 536,139,-1153 |
9 | What unusual yet valid sorting algorithm works in O(n) time but only for integers with a limited range? | radix | Go back to the starting and the house in the center is where the Last Clue lies | 623,110-1186 |
10 | What hidden but real method allows recovering data from deallocated but unwiped SSD cells? | remap | 675,111,-1100 |
TRACK2: LEFT TRACK
Signed by: RedJohn
SRNO | QUESTION | ANSWER | NEXT CLUE | COOD |
1 | What does N in VPN stand for? | Network | Follow the red blocks trail into the building and find the 2nd treasure hidden in a dark room ( You might need a torch) | 870.443,104,-1069 |
2 | What SQL keyword removes duplicate results in a query? | DISTINCT | Dont Loose hope , Just follow the Steps into the caves | 912.931,111.875,-1169.386 |
3 | What x86 instruction performs a no-operation cycle? | NOP | Got to the Birds eyeview point, can i find my noodle shops with yellow banners on top | 914.201,100,-1194.200 |
4 | What common type of malware locks files and demands payment? | ransomware | Follow the green blocks | 1001.700,110,-1107.488 |
5 | What exact Linux command grants a user administrative privileges for a single command? | sudo | Swim Swim Swim Around Until u see the Lights | 1024.558, 103, -1029.544 |
6 | What specific type of electromagnetic interference can cause unintended bit flips in memory? | crosstalk | Take left from the well and then left again and then take another left, a hidden tunnel awaits you | 922.700, 101,-1070.443 |
7 | What lesser-known attack abuses speculative execution to read kernel memory? | Spectre | Come out o the tunnel and proceed to find another well with a mysterious shop infront of it. | 930.676,101,-1036.305 |
8 | What CPU register typically stores the memory address of the next instruction? | PC | Find the Library with a ladder | 960.645,109,-1027.3 |
9 | What unusual network attack method involves forcing DNS resolvers to cache malicious records? | Poisoning | Outside the library find the trail of Green steps and follow till the highest point | 1003.575,120,-995.925 |
10 | What obscure method allows passive monitoring of CPU workloads by analyzing power fluctuations? | SideChnnerl | 948.959,115.5,-962.974 |
TRACK3: MIDDLE TRACK
Signed by: san
SRNO | QUESTION | ANSWER | NEXT CLUE | COOD |
1 | What sorting algorithm is O(n log n) on average but O(n²) in worst case? | QuickSort | Find the stairs which will take you to a door, not in the castle visited, when the red wool prevails, know that your search ends |
792.114 108 -910.877 |
2 | What single-word term describes the phenomenon where cache memory becomes ineffective due to repetitive access patterns? | thrashing | You need to go down Did you reach the waters inside the castle? You need to seek the light i planted Did you reach the waters inside the castle Just follow the light Did you reach the waters inside the castle? |
656.262 111 -908.3 |
3 | What precise term describes a CPU execution unit dedicated to floating-point calculations? | FPU | Go back up but the same way you came from. Tour guide: Deepslate Redstone Ore |
654.648 106 -878.612 |
4 | What standard defines laptop RAM form factors? | SO-DIMM | You still need to go back up Remember the castle you entered from Remember the glass pattern on the floor Remember there were two other turns there Remember, you can open a door |
640.394 103 -911.851 |
5 | What is the type of attack that tricks a processor into executing unintended code by modifying branch predictions? | Poison | It’s not Go to the left. A hidden door Did you find it? Its a door but Its easy to find. Not hidden |
801.033 111 -1008.537 |
6 | What exact power supply connector is used for modern GPUs? | PCIe | Water? Why m I surrounded by water? Why can’t i escape? |
816.636 106 -849.046 |
7 | What programming paradigm is based on function composition and immutability? | Functional | Shop. So many shops. Sad shops. Happy shops. Shop. |
825.419 108 -780.487 |
8 | What attack floods a system with half-open TCP connections? | SYN | Are you cheating on me? What? NO I saw you in a cafe Cafe? What cafe? Find the cafe and expose the sin |
844.781 108 -781.072 |
9 | What precise Linux kernel function is responsible for copying user input to kernel space? | copy_from_user | Follow the perimeter of the map to get a road resembling a tar road, the thing you want to find is in the garage Go to circular brown sky stairs and get out of perimeter |
910.567 108 -878.700 |
10 | An attack tricks USB devices into behaving as keyboards. What is the USB called? | RubberDuckky | 1201.678 102 -985.716 |
Telegram group: Join link
Event Coordinators: