Hi [REDACTED],
I need your services.
Last week, we infiltrated the network of the huge international bank [REDACTED].
When analyzing the network traffic, our compromised workstation discovered a suspicious API thath seems to be the endpoint of a support application.
Since we are listening the network, it was used only once.
I need you to recover the ticket content.
We are forwarding all the requests to the API for you at challenges.42ctf.org:2001.
Regards,
[REDACTED]