UofTCTF'24: Out of the Bucket
This was a pretty easy and interesting misc challenge that utilises Google’s Cloud Storage. We are given a url to a bucket, and we have to find the flag within the bucket.
The Challenge
The Analysis
Opening the link, we are greeted with a website that looks like this:
Usually, when I get a website to look at, I would check the source code. However, this time, there was nothing in the source code.
So, I had to look deeper into this challenge. Seeing the url storage.googleapis.com...
I found that it was a Google Cloud Storage bucket, and the text that followed was the name of the bucket.
The Solution
I searched up tools to access files in a Bucket, and I found that there was a CLI tool called gsutil
.
With reference to the gsutil documentation, I tried to gain more information about the bucket.
To see the files in the bucket:
Essentially, the command lists the files in the bucket, and gs://
is used to specify that it is a Google Cloud Storage bucket. So, we see that there are two folders, secret
and src
. To download the files, we can use the cp
command.
The -m
flag is used to enable parallel copying (to speed up the process), and the -r
flag is used to copy recursively. And, we get two files, dont_show
and funny.json
.
Looking at the contents of both files:
Within dont_show
is the flag! :D
The other file, funny.json
is for the next part of the challenge.