Target from: Escape Rooms Network

Expert, Rootable, Timed

unpackaged / 0.0.0.0

10: Flags (6:other, 2:system, env, root)
1: Service
8,400 pts
Avg. headshot: 58,231 minutes

45%

Level 20 / Master Hax0r

M4sk0ff / 14th Place

4: Flags found
1: Service discovered
2,600 pts

Can you abuse the package manager of each step to get a shell? The flag from each level can be used as a password to login directly to that user.

3 Headshots (newer first)

Activity Stream

Latest activity on the platform

M4sk0ff Got the [npm] flag of unpackaged for 500 points, 5 months ago
M4sk0ff Got the [pip] flag of unpackaged for 400 points, 5 months ago
M4sk0ff Got the [composer] flag of unpackaged for 300 points, 5 months ago
M4sk0ff Discovered the ETSCTF flag on gecos details of a target for 1300 points, 14 months ago
M4sk0ff Discovered an SSH service on target unpackaged for 100 points, 14 months ago