A Bucket Load of Trouble - Solution

Introduction

GlobalButter is launching a new product called 'StarTrekButter'. This will be a subsiadary of GlobalButter.

The admins of 'StarTrekButter' like to use a lot of AWS services, their favorite being Amazon S3.

However, they are very bad at security. There is news in the underground that someone has leaked some sensitive files into an S3 bucket but have poorly configured it making it available to the public.

Just some additional info, last week two buckets were discovered called 'admin.startrekbutter' and 'hr.startrekbutter'.

Starting point

  1. Download the custom dictionary from the link given below

  2. Update the dictionary to fit the company's naming convention

Your task

  1. Find the name of the misconfigured S3 bucket

  2. Find the 'flag.txt' file in the bucket

Note: Use this custom dictionary stolen from their servers to find the bucket and the flag file. You may have to edit the dictionary to align with the company's naming convention as shown above!

https://s3.amazonaws.com/awscloudsec-ctf-helpfiles/startrekbutter-bucketnames.txt

Walkthrough

Download the dictionary from the URL provided

https://s3.amazonaws.com/awscloudsec-ctf-helpfiles/startrekbutter-bucketnames.txt

Append the notation ".startrekbutter" to each word in the dictionary

Use AWSBucketDumper to hunt for these buckets using the custom dictionary and a zero byte grep file

touch s.txt

Use the -d to download the files so that you can check the content offline (this may take some time)

python AWSBucketDump.py -l startrekbutter-bucketnames.txt -g s.txt -D -d 1

If this is taking too long, simply look through the output to see the flag.txt

Flag is in http://testlab.startrekbutter.s3.amazonaws.com/COM/flag.txt

The flag is "Buried_Inside_Buckets"

Last updated