Intermediate, Rootable, Timed

krusty / 0.0.0.0

9: Flags (5:other, 2:system, env, root)
3: Services
6,800 pts
Avg. headshot: 67,085 minutes

#headshot

Level 17 / Junior Hax0r

muninn / 106th Place

9: Flags found
3: Services discovered
3,700 pts
1,421 minutes

Krusty will drive you crazy. It is so straight forward and yet, if you don't pay attention to details your frustration will go to the roof. And don't forget what Krusty always say "copy+paste blindly is not your friend..."

64 Headshots (newer first)

muninn, davidbz, Orakmack, XNOEX, tijzwa, guguvk, vanskii, soqui, briancgx, cavca2012, Astralis, jospit007, kr0n0z11, Caritattriste, Kall, Ckabos, kd3n4, Byt3P4ss, VagelhsKatsouras
hackercon101, c0nfirm, s4wbvnny, Atlantica, B0NES, sh4d3, jacbra, ReyLagarto, Khelthal, Ghidra, JoeLitti, 0xm0i, volfberg, antonioban, jaxafed, noother, mikejam, Twelve, xcode0x, Sev7en, M4sk0ff, Grosik, d00msl4y3r, AskTaimoor, srrequiem, M96oL, r0b0tG4nG, g0rchy, biba22, Pegasus, sn1per

Activity Stream

Latest activity on the platform

muninn managed to headshot [krusty], in 1,421 minutes, 4 days ago
muninn Discovered an SSH service on a target host for 50 points, 4 days ago
muninn Gained access to data stored in environmental variables of a server for 450 points, 4 days ago
muninn Discovered the ETSCTF file under the shadow file of a server for 650 points, 4 days ago
muninn Discovered an ETSCTF flag on a file of a target host for 100 points, 4 days ago
muninn Discovered an ETSCTF flag on a file of a target host for 100 points, 4 days ago
muninn Discovered an ETSCTF flag on a mail server user of a target host for 350 points, 4 days ago
muninn Escalated privilege on a server to read any file for 750 points, 4 days ago
muninn Discovered the ETSCTF file under the /etc/passwd file of a server for 650 points, 4 days ago
muninn Discovered an ETSCTF flag on a file of a target host for 200 points, 5 days ago