Target list

List of currently available targets

TargetProgress 
No targets exist for the given criteria...

2 Headshots / Average time: 281 minutes (ordered by date)

tutorial-101

July 6, 2023
1 hour, 34 minutes, 41 seconds

flanders

July 6, 2023
4 hours, 41 minutes, 18 seconds

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
July 6, 2023
1 hour, 32 minutes, 22 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

673rd.
5,437
674th.
5,427
675th.
5,414
676th.
5,410
677th.
5,407
678th.
5,400
679th.
5,400
680th.
5,387

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

409th.
5,487
410th.
5,437
411th.
5,427
412th.
5,414
413th.
5,410
414th.
5,400
415th.
5,387
416th.
5,350

Activity Stream

Latest activity on the platform

Pwn3r managed to headshot [flanders], in 281 minutes, 16 months ago
Pwn3r Gained access to data stored in environmental variables of flanders for 900 points, 16 months ago
Pwn3r Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 16 months ago
Pwn3r Got access to the /root folder of flanders for 1500 points, 16 months ago
Pwn3r Discovered the ETSCTF flag from a password file of a server for 1000 points, 16 months ago
Pwn3r Discovered a target service on flanders for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What is the flag being displayed by the default function above?] for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What is the name of the default function being called?] for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 16 months ago
Pwn3r Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 16 months ago