Target list

List of currently available targets

TargetProgress 
barney 1/1 7/6 164
lfi-tutorial 1/1 2/1 534
smithers 2/2 7/1 369
flanders 1/1 4/0 468
nopal 1/1 5/0 111
bart 1/1 8/0 146

1 Headshots (ordered by date)

tutorial-101

August 30, 2023
33 minutes, 9 seconds

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
August 30, 2023
26 minutes, 47 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

569th.
8,300
570th.
8,267
571st.
8,217
572nd.
8,210
573rd.
8,210
574th.
8,200
575th.
8,197
576th.
8,187

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

313th.
8,600
314th.
8,400
315th.
8,346
316th.
8,305
317th.
8,267
318th.
8,217
319th.
8,210
320th.
8,210

Activity Stream

Latest activity on the platform

W0T4N Escalated privilege on a server to read any file for 1500 points, 4 months ago
W0T4N Discovered the ETSCTF flag on a PHP source code for 900 points, 4 months ago
W0T4N Discovered the ETSCTF file under the /etc/passwd file of a server for 1300 points, 4 months ago
W0T4N Discovered the ETSCTF file under the shadow file of a server for 1300 points, 4 months ago
W0T4N Discovered the ETSCTF flag on a HTML source code for 100 points, 4 months ago
W0T4N Discovered the hidden resource of a web server for 100 points, 4 months ago
W0T4N Discovered a web service of a target host for 100 points, 4 months ago
W0T4N Answered the question of Argum E Nvative [How is the binary expected to be run?] for 300 points, 17 months ago
W0T4N Answered the question of Argum E Nvative [What is the expected env flag?] for 350 points, 17 months ago
W0T4N Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 17 months ago