Log File Forensics
Analyze real-world web server logs to uncover suspicious activity hidden among normal traffic. Track attackers, spot their successful intrusion, and recover the hidden flag from compromised files.
Scenario
A web server has been experiencing suspicious activity over the past few days. You've been given access to the server's access logs and need to identify what happened and when. The server logs show 3 days of activity with normal traffic mixed with various attack attempts. Somewhere in the file there is an exfiltrated flag that needs to be tracked down.
Learning Objectives
Learn to read and inter...
This is just a preview of the challenge description. Sign up to access the full challenge details and start learning!
Sign Up to See Full DescriptionReady to Start This Challenge?
Sign up to access this challenge and start learning cybersecurity through hands-on practice.
