Instructions
DEADFACE is known for leaving a “calling card” on systems they exploit. What flag did the attackers leave after they gained root access to the web server?
Submit the flag as flag{flag_text}
Use the packet capture from Scans.
Solution
flag{pr1vesc_wi7h_cROn}