Target from: CTF Playground

Advanced, Rootable, Timed

flaskyruby / 0.0.0.0

5: Flags (other, 2:system, env, root)
2: Services
5,600 pts
Avg. headshot: 13,631 minutes

#headshot

Level 20 / Master Hax0r

pap4s / 31st Place

5: Flags found
2: Services discovered
5,600 pts
52 minutes

Our friend Ruby had a couple of flasks while making this application, so security is a bit flaky...

Activity Stream

Latest activity on the platform

pap4s managed to headshot [flaskyruby], in 52 minutes, 12 months ago
pap4s Discovered the hidden resource of a web server for 400 points, 12 months ago
pap4s Gained access to data stored in environmental variables of a server for 900 points, 12 months ago
pap4s Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 12 months ago
pap4s Got the ETSCTF flag under the /root folder of flaskyruby for 1500 points, 12 months ago
pap4s Discovered the ETSCTF flag on gecos details of a target for 1300 points, 12 months ago
pap4s Discovered a web service on a target host for 100 points, 12 months ago
pap4s Discovered a secure shell service on a target host for 100 points, 12 months ago