Target list

List of currently available targets

TargetProgress 
bart 1/1 8/0 144
nopal 1/1 5/0 110
barney 1/1 7/6 162
smithers 2/2 7/1 367
flanders 1/1 4/0 464
lfi-tutorial 1/1 2/1 530

1 Headshots (ordered by date)

tutorial-101

August 30, 2023
33 minutes, 9 seconds

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
August 30, 2023
26 minutes, 47 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

561st.
HelloWorld
8,613
562nd.
8,600
563rd.
8,400
564th.
8,346
565th.
8,305
566th.
8,300
567th.
8,267
568th.
8,217

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

313th.
8,400
314th.
8,346
315th.
8,305
316th.
8,267
317th.
8,217
318th.
8,210
319th.
8,210
320th.
8,200

Activity Stream

Latest activity on the platform

W0T4N Escalated privilege on a server to read any file for 1500 points, 3 months ago
W0T4N Discovered the ETSCTF flag on a PHP source code for 900 points, 3 months ago
W0T4N Discovered the ETSCTF file under the /etc/passwd file of a server for 1300 points, 3 months ago
W0T4N Discovered the ETSCTF file under the shadow file of a server for 1300 points, 3 months ago
W0T4N Discovered the ETSCTF flag on a HTML source code for 100 points, 3 months ago
W0T4N Discovered the hidden resource of a web server for 100 points, 3 months ago
W0T4N Discovered a web service of a target host for 100 points, 3 months ago
W0T4N Answered the question of Argum E Nvative [How is the binary expected to be run?] for 300 points, 16 months ago
W0T4N Answered the question of Argum E Nvative [What is the expected env flag?] for 350 points, 16 months ago
W0T4N Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 16 months ago