Target list

List of currently available targets

TargetProgress 
flanders 1/1 4/3 474
tutorial-101 3/3 6/0 989
smithers 2/2 7/1 370

1 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
July 24, 2023
43 minutes, 33 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

745th.
4,900
746th.
4,887
747th.
4,887
748th.
Pyth0nK1d
4,887
749th.
4,887
750th.
4,863
751st.
as7r0nu11
4,837
752nd.
rainbowii
4,826

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

465th.
4,987
466th.
4,920
467th.
4,900
468th.
4,887
469th.
4,887
470th.
Pyth0nK1d
4,887
471st.
4,887
472nd.
4,863

Activity Stream

Latest activity on the platform

IvanMarmolejo1 Gained access to data stored in environmental variables of flanders for 900 points, 18 months ago
IvanMarmolejo1 Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 18 months ago
IvanMarmolejo1 Discovered the ETSCTF flag from a password file of a server for 1000 points, 18 months ago
IvanMarmolejo1 Discovered a target service on flanders for 100 points, 18 months ago
IvanMarmolejo1 Discovered a treasure on a memory object caching system for 1000 points, 18 months ago
IvanMarmolejo1 Discovered a web application for 100 points, 18 months ago
IvanMarmolejo1 Discovered the port of a memory caching daemon for 100 points, 18 months ago
IvanMarmolejo1 Answered the question of The fake binary bypass [What is the linux distro and version this binary was most likely compiled on?] for 100 points, 20 months ago
IvanMarmolejo1 Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 20 months ago
IvanMarmolejo1 Answered the question of The fake binary bypass [What is the ident flag from this binary?] for 100 points, 20 months ago