Temporal Anomaly
Forensics
300 pts
standard
Challenge Description
The logs were pulled from a compromised system shortly before it went offline.
Nothing appears obviously malicious.
No suspicious binaries. No strange connections.
Just… time.
Timestamps that don’t line up. Events that shouldn’t exist.
It’s subtle — easy to miss if you trust the system too much.
But attackers don’t always leave files behind.
Sometimes, they leave patterns.
Find what doesn’t belong.
Files
Submit Flag
Login to submit a flag.