Target list

List of currently available targets

TargetProgress 
smithers 2/2 7/1 362
aryabhata 2/2 7/0 56
cupidme 1/1 6/2 148
tutorial-101 3/3 6/4 947
nopal 1/1 5/0 104
lfi-tutorial 1/1 2/1 516

1 Headshots / Average time: 7,282 minutes (ordered by date)

flanders

December 17, 2021
5 days, 1 hour, 22 minutes, 15 seconds

2 Challenges solved

echoCTF Tutorial 101

6 Questions / easy
December 12, 2021
11 minutes, 50 seconds

LFI Tutorial 101

5 Questions / easy
December 12, 2021
7 minutes, 47 seconds

Global Leaderboard

Listing current player page on a global scale. Updated every 10 minutes

521st.
9,319
522nd.
9,270
523rd.
Hurr123
9,127
524th.
9,103
525th.
9,062
526th.
8,976
527th.
confiant
8,936
528th.
8,893

Leaderboard for Unknown

Listing current player page for Unknown. Updated every 10 minutes

289th.
8,976
290th.
confiant
8,936
291st.
8,893
292nd.
8,837
293rd.
8,800
294th.
8,740
295th.
darkGhost
8,716
296th.
8,647

Activity Stream

Latest activity on the platform

xaliom Got the ETSCTF username flag from the /etc/passwd file of a server for 1300 points, 29 months ago
xaliom Got an ETSCTF flag by exploiting the upload form at cupidme for 350 points, 29 months ago
xaliom Got in touch with tcp://cupidme for 100 points, 29 months ago
xaliom Discovered a web service on nopal for 100 points, 35 months ago
xaliom Answered the question of The fake binary bypass [What was the source code filename?] for 100 points, 35 months ago
xaliom Answered the question of The fake binary bypass [What is the ident flag from this binary?] for 100 points, 35 months ago
xaliom Discovered a web based service too early at aryabhata for 100 points, 35 months ago
xaliom Went through a rabbit hole at aryabhata for 100 points, 35 months ago
xaliom managed to headshot [flanders], in 7,282 minutes, 35 months ago
xaliom Gained access to data stored in environmental variables of flanders for 900 points, 35 months ago