Target from: CTF Playground
2: Flags (2:app
)
1: Service
1,010 pts
Avg. headshot: 4,444 minutes
0: Flags found
1: Service discovered
10 pts
Welcome to Pling, this misconfiguration is so common that it has a name starting with off-by something something. By exploiting this vulnerability you will be able to access files far outside your reach as a normal user.
To start the challenge visit the page at http://10.0.14.26:1337/ and try to follow the instructions. Your timer starts from the first time you connect to the service.
35 Headshots (newer first)
Sid110307, karpik, Atlantica, doofyr, Byt3P4ss, poggiesai, hazy, cavca2012, DamianPellejero, Pablo977, jaxafed, antonioban, 4rl4dn4, uApocryphon, noother, B13ss3d, AskTaimoor, No0ne, Clientname
Tr1s, Sev7en, D1ie3z, srrequiem, bas1c, vicky5, ddr4ramm, PufferOverflow, Grosik, r0b0tG4nG, Pegasus, sirEgghead, biba22, g0rchy, hitmanalharbi, mpz
1 Writeup by:
Activity Stream
Latest activity on the platform
darklordbnl Is getting started with pling for 10 points, 13 months ago