Target from: Escape Rooms Network

Expert, Rootable, Timed

unpackaged / 0.0.0.0

10: Flags (6:other, 2:system, env, root)
1: Service
8,400 pts
Avg. headshot: 58,231 minutes

9%

Level 17 / Junior Hax0r

markuche / 59th Place

0: Flags found
1: Service discovered
100 pts

Can you abuse the package manager of each step to get a shell? The flag from each level can be used as a password to login directly to that user.

3 Headshots (newer first)

Activity Stream

Latest activity on the platform

markuche Discovered an SSH service on target unpackaged for 100 points, 11 months ago