7: Flags (3:app, 2:system, env, root
)
1: Service
6,200 pts
Avg. headshot: 46,426 minutes
7: Flags found
1: Service discovered
6,200 pts
198 minutes
A system in honor of the NCSA web server, full of its original Common Gateway Interface utilities.
Needless to say these are old, just like one of the multiple ways you can gain access to this system. Escalation needs no actual programming experience, but you have to know how a unix system tries to find the commands you run.
Try not to get to hurt the target too much, you dont want to make its bleed its heart out.
83 Headshots (newer first)
s4wbvnny, c0nfirm, hackercon101, Caritattriste, Astralis, stellarix, 0xaNr, Ckabos, Khelthal, cavca2012, 0xL3dAv, Atlantica, doofyr, Ghidra, XMLRPC, ch3l1, uApocryphon, L4R05, michyamrane
Activity Stream
Latest activity on the platform
M41w4r3 Discovered a flag on a target web service for 100 points, 49 months ago
M41w4r3 Discovered a flag on a cgi script of a target that shows how long the system is up for 500 points, 49 months ago
M41w4r3 Gained access to data stored in environmental variables of
legacy
for 900 points, 49 months ago
M41w4r3 Discovered the ETSCTF username flag under the shadow file of
legacy
for 1300 points, 49 months ago
M41w4r3 Got the ETSCTF username flag from the /etc/passwd file of a server for 1300 points, 49 months ago
M41w4r3 Discovered a flag cgi on a target service for 500 points, 49 months ago
M41w4r3 Discovered a service on a target host for 100 points, 49 months ago