Tags: forensics 

Rating:

> Hi there incident responder. So we have this company that was breached sometime last week, but their SOC team only keeps HTTP request logs ? We took down all of our wolvsecsolutions websites as a precaution.
>
> Maybe there’s still a way to figure out what happened? Why did they click on a suspicious link? Somebody told me there’s a flag on the link now?

We parse logs containing the keyword wolvsecsolutions. You can use an editor to do this. I used sublimetext. (Ctrl+L to get the selected keywords as a complete row)

[Link for sublimetext video](https://margheritaviola.com/2024/03/20/wolvctf-forensics-log-analysis-writeup/).

Here I delete frequently used hosts for example dev.wolvsecsolutions.
[Link for sublimetext video](https://margheritaviola.com/2024/03/20/wolvctf-forensics-log-analysis-writeup/).

One of the remaining hosts draws our attention.

![](https://margheritaviola.com/wp-content/uploads/2024/03/image-61.png)

![](https://margheritaviola.com/wp-content/uploads/2024/03/image-62.png)

`wctf{ph1sh3r5_l0v3_c0py1ng_d0m41n_n4m35}`

Original writeup (https://margheritaviola.com/2024/03/20/wolvctf-forensics-log-analysis-writeup/).