7: Flags (3:app, 2:system, env, root
)
1: Service
6,200 pts
Avg. headshot: 46,426 minutes
7: Flags found
1: Service discovered
6,200 pts
1,459 minutes
A system in honor of the NCSA web server, full of its original Common Gateway Interface utilities.
Needless to say these are old, just like one of the multiple ways you can gain access to this system. Escalation needs no actual programming experience, but you have to know how a unix system tries to find the commands you run.
Try not to get to hurt the target too much, you dont want to make its bleed its heart out.
83 Headshots (newer first)
s4wbvnny, c0nfirm, hackercon101, Caritattriste, Astralis, stellarix, 0xaNr, Ckabos, Khelthal, cavca2012, 0xL3dAv, Atlantica, doofyr, Ghidra, XMLRPC, ch3l1, uApocryphon, L4R05, michyamrane
Activity Stream
Latest activity on the platform
S4lch1 Discovered a flag on a target web service for 100 points, 14 months ago
S4lch1 Gained access to data stored in environmental variables of
legacy
for 900 points, 14 months ago
S4lch1 Discovered the ETSCTF username flag under the shadow file of
legacy
for 1300 points, 14 months ago
S4lch1 Discovered a flag cgi on a target service for 500 points, 14 months ago
S4lch1 Got the ETSCTF username flag from the /etc/passwd file of a server for 1300 points, 14 months ago
S4lch1 Discovered a flag on a cgi script of a target that shows how long the system is up for 500 points, 14 months ago
S4lch1 Discovered a service on a target host for 100 points, 14 months ago