Based on the payload discovered, the employee’s computer was used to compromise a machine in our network.
We checked the machine and confirmed that we’ve lost SSH access to it.
Can you check if we can get the access back?
Flag format:
flag{string}
Action | Rating | Author team |
---|---|---|
Read writeup |
not rated
|
Cyb3rTh1eveZ |
Read writeup |
not rated
|
Hackatsuk1 |