Target from: HACK[MEX] CTF

Advanced, Rootable, Timed

magical / 0.0.0.0

4: Flags (2:system, env, root)
2: Services
5,200 pts
Avg. headshot: 8,963 minutes

#headshot

Level 10 / PenTester

steezy / 259th Place

4: Flags found
2: Services discovered
4,550 pts
5,027 minutes

Messing with one file to affect another, may sound like magic but its simply an inode away...

60 Headshots (newer first)

steezy, afafafa, papel, MaydazZz, 4b3j1t4, M4NV3L787, ghoztrecon, Sadko, SantyNog7, IArstuk, AdroxNs, babo987, devious, 0xdragonh4ck0S, Praise, Erasmus97, robotGH, NImporteQui, XMLRPC
Bytehxz, RepugnamShip33, Settra, ErikHumo, Orakmack, XNOEX, Dgonzalezb1500, drchunGa, Ookami, AYOROZ, vanskii, Pain, ETH3RNAL, DystopianRescuer, mrtaichi, S4lch1, Flooor, igatsby1, Veggie6636, guguvk, Jul3sxb, slash, br4ndj4r3d, Astralis, Caritattriste, TroyLynx, Rootless, s4wbvnny, c0nfirm, hackercon101, B0NES

Activity Stream

Latest activity on the platform

steezy managed to headshot [magical], in 5,027 minutes, 1 month ago
steezy Discovered the ETSCTF username flag under an authentication database file of a server for 650 points, 1 month ago
steezy Discovered a remote shell service on a target host for 100 points, 1 month ago
steezy Discovered the ETSCTF flag on gecos details of a target for 1300 points, 1 month ago
steezy Gained access to data stored in environmental variables of a server for 900 points, 1 month ago
steezy Got the ETSCTF flag under the /root folder of magical for 1500 points, 1 month ago
steezy Discovered a web service on a target host for 100 points, 1 month ago