Investigate “Digital Bank” and uncover what happened.
Work through the flow. Form a hypothesis about the attacker’s initial access, then prove compromise by submitting the correct flag as evidence.
Target: https://digitalbank.jubilian.io
Tip: Explore public flows (login, password reset, account recovery). Observe responses and state changes closely.
Part 1 — Initial Access (Multi-Select)
Based on what you can gather, which technique(s) best explain how the attacker initially got in?
Part 2 — Evidence of Compromise
Identify the exact vulnerability and submit the flag as concrete evidence.
Investigation Complete
Work through the steps above. Once you prove compromise, a summary will appear here.