Temporal Anomaly

Forensics 300 pts standard
Challenge Description

The logs were pulled from a compromised system shortly before it went offline.

Nothing appears obviously malicious.

No suspicious binaries. No strange connections.

Just… time.

Timestamps that don’t line up. Events that shouldn’t exist.

It’s subtle — easy to miss if you trust the system too much.

But attackers don’t always leave files behind.

Sometimes, they leave patterns.

Find what doesn’t belong.

Submit Flag

Login to submit a flag.

← All Challenges