Target from: CTF Playground

Advanced, Rootable, Timed

flaskyruby / 0.0.0.0

5: Flags (other, 2:system, env, root)
2: Services
5,600 pts
Avg. headshot: 12,496 minutes

#headshot

Level 15 / Senior CTFer

fakeIn / 82nd Place

5: Flags found
2: Services discovered
5,600 pts
48 minutes

Our friend Ruby had a couple of flasks while making this application, so security is a bit flaky...

Activity Stream

Latest activity on the platform

fakeIn managed to headshot [flaskyruby], in 48 minutes, 7 months ago
fakeIn Got the ETSCTF flag under the /root folder of flaskyruby for 1500 points, 7 months ago
fakeIn Discovered the ETSCTF flag on gecos details of a target for 1300 points, 7 months ago
fakeIn Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 7 months ago
fakeIn Gained access to data stored in environmental variables of a server for 900 points, 7 months ago
fakeIn Discovered the hidden resource of a web server for 400 points, 7 months ago
fakeIn Discovered a web service on a target host for 100 points, 7 months ago
fakeIn Discovered a secure shell service on a target host for 100 points, 7 months ago