The Xf4kt0r

My scratch pad for notes and things.

View on GitHub

MetaCTF: Antisyphon Flash CTF - Cloud

Challenge: Breaching Buckets

Initially, I looked at this challenge and thought it might have something to do with steganography due to the use of the photos. However, I spent a little time with the image and couldn’t find anything glaringly obvious so I put it down for awhile. I came back and reread the description and thought maybe I could traverse the directories.

First tried just backing off each subdirectory like so:

Nothing super exciting by some xml data so then I thought, well maybe we could through in a few .. after each subdirectory

And then bingo, that last attempt returned an xml document will all of the photos being hosted on the site. Now, how can I retrieve them using the xml data. Well, I didn’t, not yet but I was working (learning) how to parse the xml document.

In the mean time, I just used some bash scripting to pull the images (not the cleanest method) and started browsing them. Yeah, I didn’t iterate over the years. I had planned to do that manually.

for y in {01..12}; do for x in {01..31}; do curl https://prod-cdn-user-imgs.s3.us-east-1.amazonaws.com/ksmith3892/2019/$y/$x.jpg -o $y$x.png; done; done

Started browsing the png’s and then, there it was,
https://prod-cdn-user-imgs.s3.us-east-1.amazonaws.com/ksmith3892/2019/09/05.jpg

0905

Not the cleanest and most efficient but it got the job done.