First Contact 1: Attacked

You are a newly hired researcher at [REDACTED] Research Station out in the north Canadian tundra. Your research team is looking for an object that fell from the sky that nearby radar stations detected. Shortly after impact, your station’s SSH server started having suspicious connections. Having a background in information technology, you have been asked by the station manager to find which users are being attacked on the server.

Find the user that is being attacked, given the authentication logs and submit it as the flag wrapped with CTF{ and }.

  • auth.log
    • SHA256 checksum: 22af4e0055729f67a8e6c0aef9054977480df46267f1a09c918e271bd9ec666a

No comments yet.