/|      __
                        / |   ,-~ /
                       Y :|  //  /
                       | jj /( .^
                       >-"~"-v"
                      /       Y
                     jo  o    |
                    ( ~T~     j
                     >._-' _./
                    /   "~"  |
                   Y     _,  |
                  /| ;-"~ _  l
                 / l/ ,-"~    \
                 \//\/      .- \
                  Y        /    Y
                  l       I     !
                  ]\      _\    /"\
                 (" ~----( ~   Y.  )
        

Follow The Rabbit Hole

"The only way out is through..."

security@unifiedhq:~

$cat /etc/motd

Welcome, security researcher.

You've discovered our bug bounty program.

Complete the challenges to prove your skills.

Find real vulnerabilities to earn rewards.

$echo "The deeper you go, the more you understand..."

Those who reach the bottom will find the contact.

$_

Bug Bounty Rewards

We pay for security vulnerabilities. Responsible disclosure only.

Critical
10,000 DKK
High
5,000 DKK
Medium
2,000 DKK
Low
Recognition
> Complete all levels to unlock the secure submission method.
1
The Beginning

> What creature leads Alice into Wonderland? The same one watches over this page.

2
The Source
3
The Encoding
4
The Protocol
5
The Final Gate
"Curiouser and curiouser..." - Alice, 1865