UofTCTF'24: Out of the Bucket
This was a pretty easy and interesting misc challenge that utilises Google’s Cloud Storage. We are given a url to a bucket, and we have to find the flag within the bucket.
The Challenge
The Analysis
Opening the link, we are greeted with a website that looks like this:

Usually, when I get a website to look at, I would check the source code. However, this time, there was nothing in the source code.
So, I had to look deeper into this challenge. Seeing the url storage.googleapis.com... I found that it was a Google Cloud Storage bucket, and the text that followed was the name of the bucket.
The Solution
I searched up tools to access files in a Bucket, and I found that there was a CLI tool called gsutil.
With reference to the gsutil documentation, I tried to gain more information about the bucket.
To see the files in the bucket:
Essentially, the command lists the files in the bucket, and gs:// is used to specify that it is a Google Cloud Storage bucket. So, we see that there are two folders, secret and src. To download the files, we can use the cp command.
The -m flag is used to enable parallel copying (to speed up the process), and the -r flag is used to copy recursively. And, we get two files, dont_show and funny.json.
Looking at the contents of both files:
Within dont_show is the flag! :D
The other file, funny.json is for the next part of the challenge.