Target from: CTF Beginners
5: Flags (app, 2:system, env, root
)
1: Service
3,310 pts
5: Flags found
1: Service discovered
3,310 pts
48 minutes
This system generated a 20 character random word each time so guessing it is quite hard. Still there is a way to force your way around and get access to the flag that can be found on the same folder as the challenge.
To start the challenge connect with nc -t 10.0.41.19 1337
. Your timer starts from the first time you connect to the service.
129 Headshots (newer first)
Ephaberg, solution, c0nfirm, hackercon101, bl4ckl0t0, pablocro, Sid110307, igatsby1, Veggie6636, karpik, katto, drchunGa, mgabcn, Astralis, gh0st1, jorumago, ArturoCM, GuyFawkes, Atlantica
d4n3li, carloslaguna, kr0w, g4bh4ck, VagelhsKatsouras, Ckabos, G1ggl3r, XNOEX, doofyr, freeeee980, fredblogz90, TheRealFredP3D, JoeLitti, ragdeyo, poggiesai, boyperfer, jacbra, tijzwa, MrSheldon, D4rkZone, hazy, brave, Light7, hnn2502, darklordbnl, DamianPellejero, tachuelas, eduardo, luismtzsilva, Inj3c7i0n, Byt3B3rs3rk
2 Writeups by:
Activity Stream
Latest activity on the platform
mikecr96 Gained access to data stored in environmental variables of
stackler
for 1000 points, 19 months ago
mikecr96 Discovered the ETSCTF username flag under the shadow file of
stackler
for 800 points, 19 months ago
mikecr96 Got the ETSCTF username flag from the /etc/passwd file of
stackler
for 500 points, 19 months ago