Investigate “Digital Bank” and uncover what happened.

Work through the flow. Form a hypothesis about the attacker’s initial access, then prove compromise by submitting the correct flag as evidence.

Tip: Explore public flows (login, password reset, account recovery). Observe responses and state changes closely.

Part 1 — Initial Access (Multi-Select)

Based on what you can gather, which technique(s) best explain how the attacker initially got in?

Part 2 — Evidence of Compromise

Identify the exact vulnerability and submit the flag as concrete evidence.

Investigation Complete

Work through the steps above. Once you prove compromise, a summary will appear here.