Target list

List of currently available targets

TargetProgress 
barney 1/1 7/6 162
lfi-tutorial 1/1 2/1 528
smithers 2/2 7/1 365
flanders 1/1 4/0 461
nopal 1/1 5/0 110
bart 1/1 8/0 143

1 Headshots (ordered by date)

tutorial-101

August 30, 2023
33 minutes, 9 seconds

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
August 30, 2023
26 minutes, 47 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

561st.
8,346
562nd.
8,305
563rd.
8,300
564th.
8,267
565th.
8,217
566th.
8,210
567th.
8,210
568th.
8,200

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

313th.
8,267
314th.
8,217
315th.
8,210
316th.
8,210
317th.
8,200
318th.
8,197
319th.
8,187
320th.
8,158

Activity Stream

Latest activity on the platform

W0T4N Escalated privilege on a server to read any file for 1500 points, 3 months ago
W0T4N Discovered the ETSCTF flag on a PHP source code for 900 points, 3 months ago
W0T4N Discovered the ETSCTF file under the /etc/passwd file of a server for 1300 points, 3 months ago
W0T4N Discovered the ETSCTF file under the shadow file of a server for 1300 points, 3 months ago
W0T4N Discovered the ETSCTF flag on a HTML source code for 100 points, 3 months ago
W0T4N Discovered the hidden resource of a web server for 100 points, 3 months ago
W0T4N Discovered a web service of a target host for 100 points, 3 months ago
W0T4N Answered the question of Argum E Nvative [How is the binary expected to be run?] for 300 points, 16 months ago
W0T4N Answered the question of Argum E Nvative [What is the expected env flag?] for 350 points, 16 months ago
W0T4N Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 16 months ago