The Fall of the Great Wall (PwnSec)
Can you pass the Great Wall's defenses and retrieve the hidden artifact? https://greatwall.blob.core.windows.net/ by @CodeBreaker The challenge was flagged as medium and we 2nd blooded the challenge/
1. Fuzz and find the container name
As it is related to azure blob storage the conventional approach is to use a fuzzing tool to search for common container names. I used this tool called goblob and it comes preinstalled with some useful wordlists. The tool gave me this result:
[~] Analyzing container 'storage' in account 'greatwall' (page 1) [+][C=200] https://greatwall.blob.core.windows.net/storage?restype=container [~][1/1] Finished searching account 'greatwall'2. Exploring the container
After we found the storage container let's explore its contents. I prefer to use the Azure Storage Explorer for this because it has an easy GUI and you don't have to worry about request headers. I find a file called connection_info and I open its version history:

The first file had a larger file size, so I just downloaded that file 😂...
3. Examining the zip file
The zip file is password protected... so using John we found that the password is Wall$treet1 . Unlocking it, we get these contents:
4. Connecting to psql database
Using the credentials and psql client we can connect to the provided database. I used this line:
In this exploring the database we find the data that we were looking for:
Last updated