The Root of All Evil

75

Instructions

DEADFACE is known for leaving a “calling card” on systems they exploit. What flag did the attackers leave after they gained root access to the web server?

Submit the flag as flag{flag_text}

Use the packet capture from Scans.

Solution

flag{pr1vesc_wi7h_cROn}

Continued On

SHAshank Redemption