Target from: CTF Playground

Guru, Rootable, Timed

beanshell / 0.0.0.0

6: Flags (2:other, 2:system, env, root)
2: Services
6,500 pts
Avg. headshot: 18,982 minutes

#headshot

Level 20 / Master Hax0r

B0NES / 20th Place

6: Flags found
2: Services discovered
6,500 pts
317 minutes

Shell of reversed secure beans

24 Headshots (newer first)

xcode0x, Pegasus, Erasmus97, XNOEX, Flooor, Astralis, slash, cavca2012, s4wbvnny, hackercon101, c0nfirm, M4sk0ff, canary, phacks, 0xPhoenix, Rootless, Ckabos, uApocryphon, B0NES
xeniel, B13ss3d, D1ie3z, biba22, Pablo977

Activity Stream

Latest activity on the platform

B0NES managed to headshot [beanshell], in 317 minutes, 19 months ago
B0NES Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 19 months ago
B0NES Gained access to data stored in environmental variables of a server for 900 points, 19 months ago
B0NES Got the ETSCTF flag under the /root folder of beanshell for 1500 points, 19 months ago
B0NES Got the ETSCTF home flag of beanshell for 300 points, 19 months ago
B0NES Discovered a reverse SSH flag on a target host for 1000 points, 19 months ago
B0NES Discovered the ETSCTF flag on gecos details of a target for 1300 points, 19 months ago
B0NES Discovered a shell service on a target host for 100 points, 19 months ago
B0NES Discovered a secure shell service on a target host for 100 points, 19 months ago