Expert, Rootable, Timed

gogo-yubari / 0.0.0.0

11: Flags (7:other, 2:system, env, root)
1: Service
6,700 pts
Avg. headshot: 70,190 minutes

#headshot

Level 20 / Master Hax0r

Jul3sxb / 22nd Place

11: Flags found
1: Service discovered
6,700 pts
2,169 minutes

Gogo Yubari the web scrapper, named after the famous assassin, scraps echocity-f.com for validation of usability rules by producing a screenshot of the site.

33 Headshots (newer first)

Sadko, cavca2012, slash, Byt3P4ss, guguvk, Rec17, Astralis, Caritattriste, Ckabos, Jul3sxb, uApocryphon, H0110w, M41w4r3, D4rkZone, xeniel, jaxafed, mikejam, D1ie3z, srrequiem
Twelve, kaluzh, Grosik, xcode0x, Pegasus, biba22, r0b0tG4nG, Wh04m1, TheCyberGeek, Silver, lMinzarl, abosaif, Abady, hitmanalharbi

Activity Stream

Latest activity on the platform

Jul3sxb managed to headshot [gogo-yubari], in 2,169 minutes, 10 months ago
Jul3sxb Discovered the ETSCTF.html request handler of gogo-yubari:80 !?!?! for 400 points, 10 months ago
Jul3sxb Gained access to data stored in environmental variables of a server for 900 points, 10 months ago
Jul3sxb Got the ETSCTF flag under the /root folder of gogo-yubari for 1500 points, 10 months ago
Jul3sxb Discovered an ETSCTF flag of gogo-yubari for 100 points, 10 months ago
Jul3sxb Discovered the ETSCTF flag on gecos details of a target for 1300 points, 10 months ago
Jul3sxb Discovered an ETSCTF flag after POST on a gogo-yubari URL for 100 points, 10 months ago
Jul3sxb Discovered the ETSCTF mySQL EVENT flag of gogo-yubari for 500 points, 10 months ago
Jul3sxb Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 10 months ago
Jul3sxb Discovered the ETSCTF mySQL flag under the internal webroot of gogo-yubari for 300 points, 10 months ago