Target from: CTF Playground

Advanced, Rootable, Timed

flaskyruby / 0.0.0.0

5: Flags (other, 2:system, env, root)
2: Services
5,600 pts
Avg. headshot: 13,631 minutes

#headshot

Level 12 / Master PenTester

FemboyEnjoyer / 131st Place

5: Flags found
2: Services discovered
5,600 pts
77 minutes

Our friend Ruby had a couple of flasks while making this application, so security is a bit flaky...

Activity Stream

Latest activity on the platform

FemboyEnjoyer managed to headshot [flaskyruby] first, in 77 minutes, 14 months ago
FemboyEnjoyer Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 14 months ago
FemboyEnjoyer Discovered the ETSCTF flag on gecos details of a target for 1300 points, 14 months ago
FemboyEnjoyer Got the ETSCTF flag under the /root folder of flaskyruby for 1500 points, 14 months ago
FemboyEnjoyer Gained access to data stored in environmental variables of a server for 900 points, 14 months ago
FemboyEnjoyer Discovered the hidden resource of a web server for 400 points, 14 months ago
FemboyEnjoyer Discovered a web service on a target host for 100 points, 14 months ago
FemboyEnjoyer Discovered a secure shell service on a target host for 100 points, 14 months ago