Target list

List of currently available targets

TargetProgress 
No targets exist for the given criteria...

2 Headshots / Average time: 281 minutes (ordered by date)

tutorial-101

July 6, 2023
1 hour, 34 minutes, 41 seconds

flanders

July 6, 2023
4 hours, 41 minutes, 18 seconds

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
July 6, 2023
1 hour, 32 minutes, 22 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

697th.
5,400
698th.
5,387
699th.
5,350
700th.
5,330
701st.
5,326
702nd.
5,320
703rd.
5,310
704th.
5,304

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

425th.
5,410
426th.
5,400
427th.
5,387
428th.
5,350
429th.
5,330
430th.
5,326
431st.
5,320
432nd.
5,310

Activity Stream

Latest activity on the platform

Pwn3r managed to headshot [flanders], in 281 minutes, 18 months ago
Pwn3r Gained access to data stored in environmental variables of flanders for 900 points, 18 months ago
Pwn3r Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 18 months ago
Pwn3r Got access to the /root folder of flanders for 1500 points, 18 months ago
Pwn3r Discovered the ETSCTF flag from a password file of a server for 1000 points, 18 months ago
Pwn3r Discovered a target service on flanders for 100 points, 18 months ago
Pwn3r Answered the question of The fake binary bypass [What is the flag being displayed by the default function above?] for 100 points, 18 months ago
Pwn3r Answered the question of The fake binary bypass [What is the name of the default function being called?] for 100 points, 18 months ago
Pwn3r Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 18 months ago
Pwn3r Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 18 months ago