Target from: MemCache Network

Intermediate, Non rootable, Timed

jinn / 0.0.0.0

3: Flags (3:app)
2: Services
1,400 pts
Avg. headshot: 62,960 minutes

40%

Level 20 / Master Hax0r

r0b0tG4nG / 17th Place

0: Flags found
2: Services discovered
0 pts

Did you know that you could access server variables from within server side included HTML?

All you have to do is somehow get the value from the internal web server variable $ETSCTF defined in the NGiNX server configuration. Check the headers returned for a hint on what key you need to hack.

Pay attention at the default file extension used. There are two more flags on variables that are always defined on an nginx server { } section of the configuration.

To start the challenge connect to http://10.0.14.12:1337/index.shtml. There is also a memcached service running at port 10.0.14.12 11211. Your timer starts from the first time you connect to either of the running services on the system.

7 Headshots (newer first)

Activity Stream

Latest activity on the platform

r0b0tG4nG Connected to a caching service on jinn, 37 months ago
r0b0tG4nG Is getting started with jinn, 37 months ago