/| __
/ | ,-~ /
Y :| // /
| jj /( .^
>-"~"-v"
/ Y
jo o |
( ~T~ j
>._-' _./
/ "~" |
Y _, |
/| ;-"~ _ l
/ l/ ,-"~ \
\//\/ .- \
Y / Y
l I !
]\ _\ /"\
(" ~----( ~ Y. )
Follow The Rabbit Hole
"The only way out is through..."
security@unifiedhq:~
$cat /etc/motd
Welcome, security researcher.
You've discovered our bug bounty program.
Complete the challenges to prove your skills.
Find real vulnerabilities to earn rewards.
$echo "The deeper you go, the more you understand..."
Those who reach the bottom will find the contact.
$_
Bug Bounty Rewards
We pay for security vulnerabilities. Responsible disclosure only.
Critical
10,000 DKK
High
5,000 DKK
Medium
2,000 DKK
Low
Recognition
> Complete all levels to unlock the secure submission method.
1
The Beginning> What creature leads Alice into Wonderland? The same one watches over this page.
2
The Source 3
The Encoding 4
The Protocol 5
The Final Gate