Target from: HACK[MEX] CTF

Advanced, Rootable, Timed

squealer / 0.0.0.0

4: Flags (2:system, env, root)
2: Services
5,600 pts
Avg. headshot: 1,312 minutes

#headshot

Level 14 / CTFer

0xpwn1x / 152nd Place

4: Flags found
2: Services discovered
2,900 pts
13,008 minutes

Squeal at the squill, squeal at the web, squeal at the cli, squeal at the var Name!!!

47 Headshots (newer first)

afafafa, ghoztrecon, pap4s, babo987, mrskibidi, B0NES, Settra, 0xpwn1x, Erasmus97, robotGH, rayga, XNOEX, ETH3RNAL, RepugnamShip33, ErikHumo, pirujerike, Pain, uApocryphon, slash
Orakmack, Sonic0, SrBolillo, sh4d3, vanskii, Ookami, Bizbihackers4, Sh1r0YakSHA, guguvk, Flooor, igatsby1, Lychi3, Jul3sxb, YukaFake, D4rkZone, cavca2012, Lorne, br4ndj4r3d, Astralis, doofyr, Caritattriste, Ckabos, bytebender, TroyLynx, c0nfirm, s4wbvnny, hackercon101, jinake

Activity Stream

Latest activity on the platform

0xpwn1x managed to headshot [squealer], in 13,008 minutes, 4 months ago
0xpwn1x Got the ETSCTF flag under the /root folder of squealer for 750 points, 4 months ago
0xpwn1x Gained access to data stored in environmental variables of a server for 650 points, 4 months ago
0xpwn1x Discovered the ETSCTF username flag under an authentication database file of a server for 650 points, 4 months ago
0xpwn1x Discovered the ETSCTF flag on gecos details of a target for 650 points, 5 months ago
0xpwn1x Discovered a web service on a target host for 100 points, 5 months ago
0xpwn1x Discovered a remote shell service on a target host for 100 points, 5 months ago