Target list

List of currently available targets

TargetProgress 
No targets exist for the given criteria...

2 Headshots / Average time: 281 minutes (ordered by date)

tutorial-101

July 6, 2023
1 hour, 34 minutes, 41 seconds

flanders

July 6, 2023
4 hours, 41 minutes, 18 seconds

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
July 6, 2023
1 hour, 32 minutes, 22 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

705th.
5,400
706th.
5,387
707th.
5,350
708th.
5,330
709th.
5,326
710th.
5,320
711th.
5,310
712th.
5,304

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

433rd.
5,387
434th.
5,350
435th.
5,330
436th.
5,326
437th.
5,320
438th.
5,310
439th.
5,304
440th.
P4NU77
5,301

Activity Stream

Latest activity on the platform

Pwn3r managed to headshot [flanders], in 281 minutes, 19 months ago
Pwn3r Gained access to data stored in environmental variables of flanders for 900 points, 19 months ago
Pwn3r Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 19 months ago
Pwn3r Got access to the /root folder of flanders for 1500 points, 19 months ago
Pwn3r Discovered the ETSCTF flag from a password file of a server for 1000 points, 19 months ago
Pwn3r Discovered a target service on flanders for 100 points, 19 months ago
Pwn3r Answered the question of The fake binary bypass [What is the flag being displayed by the default function above?] for 100 points, 19 months ago
Pwn3r Answered the question of The fake binary bypass [What is the name of the default function being called?] for 100 points, 19 months ago
Pwn3r Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 19 months ago
Pwn3r Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 19 months ago