Target from: CTF Beginners

Basic, Rootable

stackler / 10.0.41.19

5: Flags (app, 2:system, env, root)
1: Service
3,310 pts

#headshot

Level 20 / Master Hax0r

Jul3sxb / 22nd Place

5: Flags found
1: Service discovered
3,310 pts
157 minutes

This system generated a 20 character random word each time so guessing it is quite hard. Still there is a way to force your way around and get access to the flag that can be found on the same folder as the challenge.

To start the challenge connect with nc -t 10.0.41.19 1337. Your timer starts from the first time you connect to the service.

193 Headshots (newer first)

xeniel, 0xdragonh4ck0S, IArstuk, ahsanch445, ulandave, seed, sudozer0day, NegaRequiem, heyonyx, RenDankill, AnAwesomeUsername, zabubu, Soychomchom, okias, muskslayer, Panda00, n3thacker, mikehawk, be444
JuanPablo23ag, C3r0d4y, zlykh, GerardoRiv10, FrankX12, joriger07, DARKZEUZ, PadillA, St4lkc0r3, m4iev, Flooor, M4NV3L787, BigNull, Crmsn3, franciscoagui, xD1v4s, GvulAn, Josesitodemorfin, lcrfr, zu1u, edualv1904, oreobyte, AYOROZ, devious, Jul3sxb, Sadko, R3i0trox, Hidden, Erasmus97, s1ngle, guguvk

Activity Stream

Latest activity on the platform

Jul3sxb managed to headshot [stackler], 8 months ago
Jul3sxb Got the /root flag folder of stackler for 900 points, 8 months ago
Jul3sxb Gained access to data stored in environmental variables of stackler for 1000 points, 8 months ago
Jul3sxb Got the ETSCTF username flag from the /etc/passwd file of stackler for 500 points, 8 months ago
Jul3sxb Discovered the ETSCTF username flag under the shadow file of stackler for 800 points, 8 months ago
Jul3sxb Got the flag of stackler for 100 points, 8 months ago
Jul3sxb Getting started with the stackler for 10 points, 8 months ago