Target from: HACK[MEX] CTF

Intermediate, Rootable, Timed

destroyercms / 0.0.0.0

4: Flags (2:system, env, root)
2: Services
5,200 pts
Avg. headshot: 8,432 minutes

#headshot

Level 20 / Master Hax0r

DystopianRescuer / 71st Place

4: Flags found
2: Services discovered
5,200 pts
863 minutes

Unleashing power across the battlefield, where destruction knows no bounds beyond the horizon.

127 Headshots (newer first)

ghoztrecon, cnfredl, Rec17, Englishx, Niiamoo14, Pegasus, Godfirst, Sadko, PABI0, AshBorn77, pinktaty, Panda00, MrGhost, n3thacker, SantyNog7, Bizbihackers2, Bizbihackers3, MaydazZz, CokJup10
Josesitodemorfin, bivg00, mahito, joriger07, 0xdragonh4ck0S, zbjarking, MiguezW, Akkher, tapsec, DarkMousy, ponpernikol, Gh0sth4ck72, PadillA, imoxaioria, DARKZEUZ, C3r0d4y, Crespo, j0r38, M4NV3L787, Iv4nol0v1sh, ErikHumo, babo987, sh4d3, MindFall, h4ckt, m3talm3rg3, Bizbihackers4, shikitimiau, 0xm0i, RepugnamShip33, Erasmus97

Activity Stream

Latest activity on the platform

DystopianRescuer managed to headshot [destroyercms], in 863 minutes, 10 months ago
DystopianRescuer Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 10 months ago
DystopianRescuer Got the ETSCTF flag under the /root folder of destroyercms for 1500 points, 10 months ago
DystopianRescuer Discovered the ETSCTF flag on gecos details of a target for 1300 points, 10 months ago
DystopianRescuer Gained access to data stored in environmental variables of a server for 900 points, 10 months ago
DystopianRescuer Discovered a remote shell service on a target host for 100 points, 10 months ago
DystopianRescuer Discovered a web service on a target host for 100 points, 10 months ago