This is an interesting HackTheBox room, specifically from the Sherlock series. In this very easy room, you will familiarize yourself with Unix’s auth.log and wtmp logs. We’ll explore a scenario where a Confluence server was brute-forced via its SSH service. After gaining access to the server, the attacker performed additional activities, which we can track […]