Target from: HACK[MEX] CTF

Advanced, Rootable, Timed

statomage / 0.0.0.0

4: Flags (2:system, env, root)
2: Services
5,200 pts
Avg. headshot: 6,928 minutes

#headshot

Level 20 / Master Hax0r

Jul3sxb / 22nd Place

4: Flags found
2: Services discovered
5,200 pts
708 minutes

What kind of mage is your current state?

34 Headshots (newer first)

steezy, afafafa, babo987, B0NES, Settra, ETH3RNAL, pap4s, S4lch1, Erasmus97, robotGH, DJAK, igatsby1, Flooor, XNOEX, RepugnamShip33, Ookami, uApocryphon, slash, ErikHumo
Orakmack, guguvk, Jul3sxb, TroyLynx, cavca2012, echoOne, Astralis, doofyr, Caritattriste, c0nfirm, hackercon101, s4wbvnny, Ckabos, jaxafed, Lychi3

Activity Stream

Latest activity on the platform

Jul3sxb managed to headshot [statomage], in 708 minutes, 8 months ago
Jul3sxb Discovered the ETSCTF username flag under an authentication database file of a server for 1300 points, 8 months ago
Jul3sxb Discovered the ETSCTF flag on gecos details of a target for 1300 points, 8 months ago
Jul3sxb Gained access to data stored in environmental variables of a server for 900 points, 8 months ago
Jul3sxb Got the ETSCTF flag under the /root folder of statomage for 1500 points, 8 months ago
Jul3sxb Discovered a web service on a target host for 100 points, 8 months ago
Jul3sxb Discovered a remote shell service on a target host for 100 points, 8 months ago