Target from: CTF Playground

Advanced, Rootable, Timed

ocracer / 0.0.0.0

6: Flags (2:other, 2:system, env, root)
2: Services
5,500 pts
Avg. headshot: 63,622 minutes

#headshot

Level 17 / Junior Hax0r

Rec17 / 101st Place

6: Flags found
2: Services discovered
5,500 pts
778 minutes

A blazing fast static server with OCR flavor. Notice that the default location partially matches another common word we use...

20 Headshots (newer first)

xcode0x, Pegasus, cavca2012, guguvk, Rec17, Sadko, Hidden, Jul3sxb, Astralis, Ckabos, S4lch1, pap4s, Byt3P4ss, D1ie3z, xRuL0, 0xm0i, uApocryphon, D4rkZone, gazette
xeniel

Activity Stream

Latest activity on the platform

Rec17 managed to headshot [ocracer], in 778 minutes, 10 months ago
Rec17 Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 10 months ago
Rec17 Gained access to data stored in environmental variables of a server for 900 points, 10 months ago
Rec17 Got the ETSCTF flag under the /root folder of ocracer for 1400 points, 10 months ago
Rec17 Discovered the ETSCTF flag on gecos details of a target for 1200 points, 10 months ago
Rec17 Discovered a traversal flag of a target for 400 points, 10 months ago
Rec17 Discovered a flag of a target for 100 points, 10 months ago
Rec17 Discovered a web service on a target host for 100 points, 10 months ago
Rec17 Discovered a secure shell service on a target host for 100 points, 10 months ago