Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!
Launch your dedicated AWS machine to begin hacking
Web server log analysis is a critical skill in cybersecurity that involves examining HTTP access logs to:
Start by examining the access.log file structure and identifying different types of requests:
# Count total log entries
wc -l access.log
# View first few entries
head -10 access.log
# Look for unique HTTP status codes
awk '{print $9}' access.log | sort | uniq -c
# Find unique user agents
awk -F'"' '{print $6}' access.log | sort | uniq
Look for common indicators of malicious activity:
# Find potential SQL injection attempts
grep -i "union\|select\|drop\|insert" access.log
# Look for XSS attempts
grep -i "script\|alert\|javascript" access.log
# Find scanner/tool requests
grep -E "(wp-admin|phpmyadmin|\.env|backup)" access.log
# Look for successful requests (200 status) from suspicious sources
grep " 200 " access.log | grep -i "scanner\|tool\|bot"
The key is to find files that attackers successfully accessed (200 status code). Let's examine suspicious entries more closely:
# Look for successful requests from suspicious user agents
grep " 200 " access.log | grep -E "(Scanner|Tool|Bot)"
# Find requests with suspicious referers
grep "attacker" access.log
# Look for successful access to sensitive files
grep " 200 " access.log | grep -E "(backup|config|admin|debug)"
After extensive analysis, you'll find that out of 129 total requests from the attacker (172.16.0.88), only ONE was successful. The key entry revealing successful attacker access:
172.16.0.88 - - [22/Jul/2025:08:32:44 +0000] "GET /backup.txt HTTP/1.1" 200 42 "https://attacker.com/tools" "SecScanner/1.0"
This single successful request is hidden among 128 failed attempts (404/403 status codes), making this a realistic example of how attackers conduct reconnaissance scans.
From the log analysis, we discover that the attacker successfully accessed /backup.txt
. The request shows:
Since the attacker was able to access this file, we should investigate what it contains:
# Access the file that the attacker found
curl https://target-site.com/backup.txt
# OR download it from the challenge page
wget backup.txt
When examining the contents of backup.txt
, we find:
FLAG: 1e3e1e7c-6b64-4727-b4bb-6e9945edd9b7
The flag is: 1e3e1e7c-6b64-4727-b4bb-6e9945edd9b7
The security incident reveals several critical findings:
By analyzing the complete log timeline, we can see the attacker's reconnaissance pattern:
This shows a systematic approach where the attacker found success with a simple backup.txt file.
This incident demonstrates several security issues:
Based on this analysis, recommended actions include:
Sign-in to your account to access your hacking courses and cyber security labs.
Access all hacking courses and cyber security labs.