Target list

List of currently available targets

TargetProgress 
No targets exist for the given criteria...

2 Headshots / Average time: 281 minutes (ordered by date)

tutorial-101

July 6, 2023
1 hour, 34 minutes, 41 seconds

flanders

July 6, 2023
4 hours, 41 minutes, 18 seconds

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
July 6, 2023
1 hour, 32 minutes, 22 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

673rd.
5,427
674th.
5,414
675th.
5,410
676th.
5,407
677th.
5,400
678th.
5,400
679th.
5,387
680th.
5,350

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

409th.
5,437
410th.
5,427
411th.
5,414
412th.
5,410
413th.
5,400
414th.
5,387
415th.
5,350
416th.
5,326

Activity Stream

Latest activity on the platform

Pwn3r managed to headshot [flanders], in 281 minutes, 16 months ago
Pwn3r Gained access to data stored in environmental variables of flanders for 900 points, 16 months ago
Pwn3r Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 16 months ago
Pwn3r Got access to the /root folder of flanders for 1500 points, 16 months ago
Pwn3r Discovered the ETSCTF flag from a password file of a server for 1000 points, 16 months ago
Pwn3r Discovered a target service on flanders for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What is the flag being displayed by the default function above?] for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What is the name of the default function being called?] for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 16 months ago