Target from: HACK[MEX] CTF

Advanced, Rootable, Timed

reponest / 0.0.0.0

4: Flags (2:system, env, root)
2: Services
5,200 pts
Avg. headshot: 30,407 minutes

#headshot

Level 20 / Master Hax0r

0xdragonh4ck0S / 65th Place

4: Flags found
2: Services discovered
5,200 pts
328,869 minutes

Its full of nests, a full repo of nests...

48 Headshots (newer first)

devious, 0xdragonh4ck0S, Hidden, Rec17, Englishx, ghoztrecon, ax0l0t3s, C3r0d4y, D4rkZone, TroyLynx, babo987, B0NES, ETH3RNAL, Erasmus97, robotGH, Jul3sxb, Orakmack, uApocryphon, Lorne
mrtaichi, sh4d3, shikitimiau, pablocro, SrBolillo, Flooor, igatsby1, Ookami, slash, vanskii, XNOEX, NotBm0, ErikHumo, elcyberchef666, Peche, elnmap666, echoOne, br4ndj4r3d, guguvk, Astralis, Caritattriste, S4lch1, pap4s, Ckabos, c0nfirm, hackercon101, cavca2012, doofyr, Backyardigans

1 Writeup by:

Activity Stream

Latest activity on the platform

0xdragonh4ck0S managed to headshot [reponest], in 328,869 minutes, 1 month ago
0xdragonh4ck0S Gained access to data stored in environmental variables of a server for 900 points, 1 month ago
0xdragonh4ck0S Got the ETSCTF flag under the /root folder of reponest for 1500 points, 1 month ago
0xdragonh4ck0S Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 1 month ago
0xdragonh4ck0S Discovered the ETSCTF flag on gecos details of a target for 1300 points, 1 month ago
0xdragonh4ck0S Discovered a remote shell service on a target host for 100 points, 8 months ago
0xdragonh4ck0S Discovered a web service on a target host for 100 points, 8 months ago