Basic, Rootable, Timed

flanders / 0.0.0.0

4: Flags (2:system, env, root)
1: Service
4,800 pts
Avg. headshot: 50,149 minutes

#headshot

Level 14 / CTFer

0xpwn1x / 152nd Place

4: Flags found
1: Service discovered
2,950 pts
154,074 minutes

Flanders simple and kind, always ready to to give a helping hand. His favorite catch phrase is Okily Dokily

Catch phrase sounds like a pass phrase, only without space

555 Headshots (newer first)

IArstuk, Z1x1, Leftypower420, H0110w, m1nh101, 0nyx, mrsally19, 0xpwn1x, NegaRequiem, RenDankill, UserSMK, 4b3j1t4, theferMC, noname, InspectorAmbitious, Optimus07, pinktaty, okias, Vx007
davidbz, afafafa, be444, n3thacker, r00tk1d, Maxatefoe, n3rv3x, N30HxDAEMON, JuanPablo23ag, sufull, GvulAn, xD1v4s, Netrunner, Bizbihackers3, M4NV3L787, mogekood, r2d2m81, shumagorath195, kevin2758, dda2, d4nnb01, MRX1, Iv4nol0v1sh, GerardoRiv10, sudozer0day, danyx, PABI0, Oskrqq, Flooor, robotGH, oreobyte

Activity Stream

Latest activity on the platform

0xpwn1x managed to headshot [flanders], in 154,074 minutes, 1 month ago
0xpwn1x Gained access to data stored in environmental variables of flanders for 450 points, 1 month ago
0xpwn1x Discovered the ETSCTF username flag under an authentication database file of a server for 650 points, 1 month ago
0xpwn1x Got access to the /root folder of flanders for 750 points, 5 months ago
0xpwn1x Discovered the ETSCTF flag from a password file of a server for 1000 points, 5 months ago
0xpwn1x Discovered a target service on flanders for 100 points, 5 months ago