Target list

List of currently available targets

TargetProgress 
elementary 2/2 17/0 88
pcprincipal 1/1 10/0 56
aryabhata 2/2 7/0 56
cupidme 1/1 6/0 147
tutorial-101 3/3 6/5 945
CVE-2019-14813 1/1 4/0 86
lfi-tutorial 1/1 2/0 514

2 Headshots / Average time: 30 minutes (ordered by date)

flanders

February 21, 2021
16 minutes, 58 seconds

smithers

February 27, 2021
42 minutes, 4 seconds

2 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
February 21, 2021
13 minutes, 40 seconds

LFI Tutorial 101

5 Questions / easy
February 22, 2021
8 minutes, 22 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

561st.
Zaianty
7,966
562nd.
TheUnknownHack3r
7,937
563rd.
7,936
564th.
7,917
565th.
7,889
566th.
7,887
567th.
7,837
568th.
HunterManx
7,826

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

313th.
8,087
314th.
8,000
315th.
Zaianty
7,966
316th.
TheUnknownHack3r
7,937
317th.
7,936
318th.
7,917
319th.
7,889
320th.
7,887

Activity Stream

Latest activity on the platform

purpler0se Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 37 months ago
purpler0se Discovered web service on target pcprincipal for 100 points, 43 months ago
purpler0se Discovered a web based service too early at aryabhata for 100 points, 43 months ago
purpler0se Went through a rabbit hole at aryabhata for 100 points, 43 months ago
purpler0se Got in touch with tcp://cupidme for 100 points, 44 months ago
purpler0se Connected to the CVE-2019-14813 service, 44 months ago
purpler0se Discovered the SSH service of elementary for 100 points, 44 months ago
purpler0se Discovered a web service for 100 points, 44 months ago
purpler0se Answered the question of The fake binary bypass [What is the flag being displayed by the default function above?] for 100 points, 44 months ago
purpler0se managed to headshot [smithers], in 42 minutes, 44 months ago