đŸ›Ąī¸ Challenge 01 â€ĸ Linux SSH Brute-Force Detection

Offline Level 1 Client-Side Only No Backend
💡 Next Hint: 30s

Mission Brief

A monitoring alert flagged unusual authentication activity on a Linux web server (web-prod-03) at 14:13 UTC on November 28, 2025. Your task is to analyze the provided logs and determine whether an attacker successfully compromised the system via SSH brute-force.

âš ī¸ SYNTHETIC SCENARIO
All log data, IP addresses, and timestamps in this challenge are synthetically generated for training purposes. No real systems, networks, or incidents are represented.

Available Artifacts

  • /var/log/auth.log – Authentication attempts and session events
  • /var/log/syslog – System-level event confirmation
  • Interactive Terminal – Run grep/awk commands to analyze logs

Interactive Features

  • đŸ–Ĩī¸ Working Terminal – Execute real bash commands
  • 🔍 Live Search – Highlight matches in real-time
  • 📌 Evidence Locker – Tag and collect suspicious lines
  • 💡 Progressive Hints – Unlock hints over time
  • 📊 Attack Timeline – Visual event chronology
  • â„šī¸ Hover Tooltips – Learn log anatomy
  • 💡 Show Solution – View correct answers with explanations if stuck