Target from: MemCache Network

Intermediate, Non rootable, Timed

jinn / 0.0.0.0

3: Flags (3:app)
2: Services
1,400 pts
Avg. headshot: 62,960 minutes

40%

Level 2 / Webuser

AMakki1337 / 1051st Place

0: Flags found
2: Services discovered
0 pts

Did you know that you could access server variables from within server side included HTML?

All you have to do is somehow get the value from the internal web server variable $ETSCTF defined in the NGiNX server configuration. Check the headers returned for a hint on what key you need to hack.

Pay attention at the default file extension used. There are two more flags on variables that are always defined on an nginx server { } section of the configuration.

To start the challenge connect to http://10.0.14.12:1337/index.shtml. There is also a memcached service running at port 10.0.14.12 11211. Your timer starts from the first time you connect to either of the running services on the system.

7 Headshots (newer first)

Activity Stream

Latest activity on the platform

AMakki1337 Connected to a caching service on jinn, 34 months ago
AMakki1337 Is getting started with jinn, 34 months ago