Target from: CTF Beginners

Basic, Rootable

stackler / 10.0.41.19

5: Flags (app, 2:system, env, root)
1: Service
3,310 pts

#headshot

Level 3 / Trainee

fredblogz90 / 668th Place

5: Flags found
1: Service discovered
1,660 pts
22 minutes

This system generated a 20 character random word each time so guessing it is quite hard. Still there is a way to force your way around and get access to the flag that can be found on the same folder as the challenge.

To start the challenge connect with nc -t 10.0.41.19 1337. Your timer starts from the first time you connect to the service.

Activity Stream

Latest activity on the platform

fredblogz90 managed to headshot [stackler], 6 months ago
fredblogz90 Gained access to data stored in environmental variables of stackler for 500 points, 6 months ago
fredblogz90 Discovered the ETSCTF username flag under the shadow file of stackler for 400 points, 6 months ago
fredblogz90 Got the ETSCTF username flag from the /etc/passwd file of stackler for 250 points, 6 months ago
fredblogz90 Got the /root flag folder of stackler for 450 points, 6 months ago
fredblogz90 Got the flag of stackler for 50 points, 6 months ago
fredblogz90 Getting started with the stackler for 10 points, 6 months ago