Target from: Escape Rooms Network

Expert, Rootable, Timed

unpackaged / 0.0.0.0

10: Flags (6:other, 2:system, env, root)
1: Service
8,400 pts
Avg. headshot: 58,231 minutes

18%

Level 20 / Master Hax0r

Atlantica / 24th Place

1: Flags found
1: Service discovered
1,400 pts

Can you abuse the package manager of each step to get a shell? The flag from each level can be used as a password to login directly to that user.

3 Headshots (newer first)

Activity Stream

Latest activity on the platform

Atlantica Discovered the ETSCTF flag on gecos details of a target for 1300 points, 11 days ago
Atlantica Discovered an SSH service on target unpackaged for 100 points, 11 days ago