forensicseasy
An unusual sighting
hackthebox
This forensics challenge required analyzing SSH logs and bash history to identify a security incident on a development server. The task was to detect signs of unauthorized access, trace the attacker's activities, and extract the flag from the evidence.
$ ls tags/ techniques/
log-correlationtimeline-analysisbehavioral-analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]