Table of Contents
The second challenge in the web category.
From the description and 2 hints, this was what I was able to deduce after several minutes:
Challenge description: #
One of your coworkers in the cloud security department sent you an urgent email, probably about some privacy concerns for your company.
Presigning is always better than postsigning
Isn’t one of the pieces you find a folder? Look for flag.txt!
From hint 1 , lots of googling reveals the challenge is related to aws. Since I hadn’t worked with any aws CTFs before, I decided to delve into some related writeups and reading aws documentations to get some context on what this challenge was about
This particular writeup came in handy !
Okay, so we’ve gathered enough information on how to start the challenge…
Step 1: Authenticating as a valid user #
From the letter , ‘ Make sure you’re a valid user!’ is a hint that you need to successfully authenticate as a valid aws user to access the S3 bucket which is ad586b62e3b5921bd86fe2efa4919208
Step 2: Accessing the S3 bucket #
The aws documentation came in handy! I believe in reading documentation as it saves you alot from unintended errors.
From the documentation, you get a command to list the contents of the bucket
Interesting , so the bucket contains several folders
Step 3: Analysing the bucket contents #
I had to find a way to easily work with the contents of the bucket. The best way was to recursively download the bucket contents to my local directory
The cp command comes in handy and we get access to all folders in the bucket in our current local directory.
Now my guess work starts here :D
I have no way of automating this process since I don’t know what to do, so I manually start to view the folders looking for anything juicy. The second folder reveals something interesting.
I tried to access the bucket using the aws ls command but that was a dead end. The hunt goes on !
I continued probing the folders and something interesting pops up. An unusually long string.
Hmmm… this was my lightbulb moment, everything starts to add up as I reread the hints and the presigning information comes in handy.
Pre-signed URLs have five pieces of information; bucket, object, access key, signature, and expiration.
awscli tends to present them in this form:
Since the first two pieces of strings stands out from the rest of the other texts in terms of length, I decided to try and grab pieces of text less than/ greater than 30 characters.
Step 4: Solving the challenge #
From the above info, we retrieve the following pieces of text
Since we now know what presigning urls is, let’s piece the info we have and get the flag.
From the letter, we can get the expiry date and the state in which the letter and convert it into unix time.
From aws presigning protocol documentation
we can derive the following:
X-Amz-Date=20200909T195323Z (Unix date format of the date given in the letter)
X-Amz-Expires=604800 (One week in unix time(s))
Curling the request to get the flag