Target from: CTF Playground
![](/images/targets/_pling.png)
2: Flags (2:app
)
1: Service
1,010 pts
Avg. headshot: 4,107 minutes
2: Flags found
1: Service discovered
1,010 pts
1 minutes
Welcome to Pling, this misconfiguration is so common that it has a name starting with off-by something something. By exploiting this vulnerability you will be able to access files far outside your reach as a normal user.
To start the challenge visit the page at http://10.0.14.26:1337/ and try to follow the instructions. Your timer starts from the first time you connect to the service.
39 Headshots (newer first)
Touchme, katto, alamillo, echoOne, Sid110307, karpik, Atlantica, doofyr, Byt3P4ss, poggiesai, hazy, cavca2012, DamianPellejero, Pablo977, jaxafed, antonioban, 4rl4dn4, uApocryphon, noother
B13ss3d, AskTaimoor, No0ne, Clientname, Tr1s, Sev7en, D1ie3z, srrequiem, bas1c, vicky5, ddr4ramm, PufferOverflow, Grosik, r0b0tG4nG, Pegasus, sirEgghead, biba22, g0rchy, hitmanalharbi, mpz
1 Writeup by:
Activity Stream
Latest activity on the platform