Log Hunter
AdvancedA wall of server logs appears. Click the line that contains an attack.
🔦
How to play
1.5 log files scroll in — web logs, auth logs, app logs
2.Each contains exactly one attack line hidden among normal traffic
3.Click the suspicious log line to identify the attack
4.100 pts per correct find · SQL injection, XSS, brute force, path traversal, recon