What else did they do?

Having discovered the security event, investigate the user.

Ready to take the Challenge?

Read the challenge description above carefully. When you understand the prompt and feel ready to try the challenge, click the "Begin Challenge" button to start.

Feeling Ready?
Begin Challenge

Challenge Description

Using the same data set, determine if the user found in the previous challenge has done anything else malicious. You might be able to determine the attack vector by looking back at their history on our site.


Instructions

In this challenge, we'll ask you to locate a hidden "flag". To find it, you'll need to utilize your problem solving abilities and maybe a bit of code. The flag looks like: flag{some_text_here}. When you find it, you'll need to paste the whole flag in the text box in the header of this page.

This challenge is timed, so read the instructions below carefully before you begin!