Target from: Escape Rooms Network

Expert, Rootable, Timed

unpackaged / 0.0.0.0

10: Flags (6:other, 2:system, env, root)
1: Service
8,400 pts
Avg. headshot: 58,231 minutes

36%

Level 20 / Master Hax0r

antonioban / 27th Place

3: Flags found
1: Service discovered
1,300 pts

Can you abuse the package manager of each step to get a shell? The flag from each level can be used as a password to login directly to that user.

3 Headshots (newer first)

Activity Stream

Latest activity on the platform

antonioban Got the [npm] flag of unpackaged for 500 points, 17 months ago
antonioban Got the [pip] flag of unpackaged for 400 points, 17 months ago
antonioban Got the [composer] flag of unpackaged for 300 points, 17 months ago
antonioban Discovered an SSH service on target unpackaged for 100 points, 17 months ago