Expert, Rootable, Timed

gogo-yubari / 0.0.0.0

11: Flags (7:other, 2:system, env, root)
1: Service
6,700 pts
Avg. headshot: 70,190 minutes

#headshot

Level 17 / Junior Hax0r

Rec17 / 101st Place

11: Flags found
1: Service discovered
6,700 pts
2,960 minutes

Gogo Yubari the web scrapper, named after the famous assassin, scraps echocity-f.com for validation of usability rules by producing a screenshot of the site.

33 Headshots (newer first)

Sadko, cavca2012, slash, Byt3P4ss, guguvk, Rec17, Astralis, Caritattriste, Ckabos, Jul3sxb, uApocryphon, H0110w, M41w4r3, D4rkZone, xeniel, jaxafed, mikejam, D1ie3z, srrequiem
Twelve, kaluzh, Grosik, xcode0x, Pegasus, biba22, r0b0tG4nG, Wh04m1, TheCyberGeek, Silver, lMinzarl, abosaif, Abady, hitmanalharbi

Activity Stream

Latest activity on the platform

Rec17 managed to headshot [gogo-yubari], in 2,960 minutes, 10 months ago
Rec17 Discovered the ETSCTF mySQL EVENT flag of gogo-yubari for 500 points, 10 months ago
Rec17 Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 10 months ago
Rec17 Discovered the ETSCTF flag on gecos details of a target for 1300 points, 10 months ago
Rec17 Discovered an ETSCTF flag of gogo-yubari for 100 points, 10 months ago
Rec17 Discovered an ETSCTF flag after POST on a gogo-yubari URL for 100 points, 10 months ago
Rec17 Discovered the ETSCTF hidden resource of a web server for 100 points, 10 months ago
Rec17 Discovered the ETSCTF.html request handler of gogo-yubari:80 !?!?! for 400 points, 10 months ago
Rec17 Got the ETSCTF flag under the /root folder of gogo-yubari for 1500 points, 10 months ago
Rec17 Gained access to data stored in environmental variables of a server for 900 points, 10 months ago