Expert, Rootable, Timed

gogo-yubari / 0.0.0.0

11: Flags (7:other, 2:system, env, root)
1: Service
6,700 pts
Avg. headshot: 70,190 minutes

#headshot

Level 20 / Master Hax0r

Caritattriste / 15th Place

11: Flags found
1: Service discovered
6,700 pts
45 minutes

Gogo Yubari the web scrapper, named after the famous assassin, scraps echocity-f.com for validation of usability rules by producing a screenshot of the site.

33 Headshots (newer first)

Sadko, cavca2012, slash, Byt3P4ss, guguvk, Rec17, Astralis, Caritattriste, Ckabos, Jul3sxb, uApocryphon, H0110w, M41w4r3, D4rkZone, xeniel, jaxafed, mikejam, D1ie3z, srrequiem
Twelve, kaluzh, Grosik, xcode0x, Pegasus, biba22, r0b0tG4nG, Wh04m1, TheCyberGeek, Silver, lMinzarl, abosaif, Abady, hitmanalharbi

Activity Stream

Latest activity on the platform

Caritattriste managed to headshot [gogo-yubari], in 45 minutes, 10 months ago
Caritattriste Discovered an ETSCTF flag of gogo-yubari for 100 points, 10 months ago
Caritattriste Got the ETSCTF flag under the /root folder of gogo-yubari for 1500 points, 10 months ago
Caritattriste Gained access to data stored in environmental variables of a server for 900 points, 10 months ago
Caritattriste Discovered the ETSCTF.html request handler of gogo-yubari:80 !?!?! for 400 points, 10 months ago
Caritattriste Discovered the ETSCTF flag on gecos details of a target for 1300 points, 10 months ago
Caritattriste Discovered an ETSCTF flag after POST on a gogo-yubari URL for 100 points, 10 months ago
Caritattriste Discovered the ETSCTF mySQL EVENT flag of gogo-yubari for 500 points, 10 months ago
Caritattriste Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 10 months ago
Caritattriste Discovered the ETSCTF after POSTing a valid hostname on http://gogo-yubari:8080/ for 100 points, 10 months ago