Target list

List of currently available targets

TargetProgress 
memberberries 2/1 6/0 37
smithers 2/2 7/0 362

3 Headshots / Average time: 50 minutes (ordered by date)

tutorial-101

May 16, 2024
2 hours, 5 minutes, 27 seconds

lfi-tutorial

May 16, 2024
2 hours, 4 minutes, 19 seconds

flanders

May 16, 2024
50 minutes, 29 seconds

2 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
May 16, 2024
20 minutes, 56 seconds

LFI Tutorial 101

5 Questions / easy
May 16, 2024
2 hours, 11 minutes, 1 second

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

617th.
6,625
618th.
6,563
619th.
6,537
620th.
6,515
621st.
6,450
622nd.
6,437
623rd.
6,407
624th.
6,400

Leaderboard for Nepal

Listing current player page for Nepal. Updated every 10 minutes

1st.
199,817
2nd.
14,987
3rd.
11,213
4th.
7,539
5th.
6,437
6th.
4,202
7th.
837

Activity Stream

Latest activity on the platform

Kall Discovered the port of a memory caching daemon for 100 points, 1 month ago
Kall Discovered a web application for 100 points, 1 month ago
Kall Discovered a secure service on a target host for 100 points, 5 months ago
Kall Answered the question of The fake binary bypass [What is the flag being displayed by the default function above?] for 100 points, 6 months ago
Kall Answered the question of The fake binary bypass [What is the name of the default function being called?] for 100 points, 6 months ago
Kall Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 6 months ago
Kall Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 6 months ago
Kall Answered the question of The fake binary bypass [What is the ident flag from this binary?] for 100 points, 6 months ago
Kall managed to headshot [flanders], in 50 minutes, 6 months ago
Kall Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 6 months ago