Advanced, Rootable, Timed

egwuregwu / 0.0.0.0

5: Flags (app, 2:system, env, root)
2: Services
4,400 pts
Avg. headshot: 18,748 minutes

#headshot

Level 9 / PenTester 1

Dych0t0m0us / 12th Place

5: Flags found
2: Services discovered
2,300 pts
62 minutes

There is something silly about this system, and something even sillier with the encrypted password, which is 32 chars and magically starts with 0e4. So be extra careful not to collide with it...

Hints:

  • The keywords for your search are magic hashes

13 Headshots (newer first)

Activity Stream

Latest activity on the platform

Dych0t0m0us managed to headshot [egwuregwu], in 62 minutes, 4 months ago
Dych0t0m0us Got the ETSCTF flag under the /root folder of egwuregwu for 500 points, 4 months ago
Dych0t0m0us Gained access to data stored in environmental variables of a server for 500 points, 4 months ago
Dych0t0m0us Discovered the ETSCTF username flag under an authentication database file of a server for 450 points, 4 months ago
Dych0t0m0us Discovered the ETSCTF flag on gecos details of a target for 400 points, 4 months ago
Dych0t0m0us Got the juggling flag from egwuregwu for 250 points, 4 months ago
Dych0t0m0us Discovered a remote shell service on a target host for 100 points, 4 months ago
Dych0t0m0us Discovered a web service on a target host for 100 points, 4 months ago