First Contact 1: Attacked
You are a newly hired researcher at [REDACTED] Research Station out in the north Canadian tundra. Your research team is looking for an object that fell from the sky that nearby radar stations detected. Shortly after impact, your station’s SSH server started having suspicious connections. Having a background in information technology, you have been asked by the station manager to find which users are being attacked on the server.
Find the user that is being attacked, given the authentication logs and submit it as the flag wrapped with CTF{
and }
.