EncryptCodecencryptcodec
Games/Log Hunter

Log Hunter

Advanced

A wall of server logs appears. Click the line that contains an attack.

🔦

How to play

1.5 log files scroll in — web logs, auth logs, app logs
2.Each contains exactly one attack line hidden among normal traffic
3.Click the suspicious log line to identify the attack
4.100 pts per correct find · SQL injection, XSS, brute force, path traversal, recon

Frequently Asked Questions