Target from: Escape Rooms Network
10: Flags (6:other, 2:system, env, root
)
1: Service
8,400 pts
Avg. headshot: 58,231 minutes
3: Flags found
1: Service discovered
1,300 pts
Can you abuse the package manager of each step to get a shell? The flag from each level can be used as a password to login directly to that user.
Activity Stream
Latest activity on the platform