Target from: Escape Rooms Network

Expert, Rootable, Timed

unpackaged / 0.0.0.0

10: Flags (6:other, 2:system, env, root)
1: Service
8,400 pts
Avg. headshot: 58,231 minutes

27%

Level 14 / CTFer

M41w4r3 / 98th Place

2: Flags found
1: Service discovered
1,900 pts

Can you abuse the package manager of each step to get a shell? The flag from each level can be used as a password to login directly to that user.

3 Headshots (newer first)

Activity Stream

Latest activity on the platform

M41w4r3 Discovered the ETSCTF flag on gecos details of a target for 1300 points, 4 months ago
M41w4r3 Got the [npm] flag of unpackaged for 500 points, 4 months ago
M41w4r3 Discovered an SSH service on target unpackaged for 100 points, 4 months ago