The Fall of the Great Wall (PwnSec)

Can you pass the Great Wall's defenses and retrieve the hidden artifact? https://greatwall.blob.core.windows.net/arrow-up-right by @CodeBreaker The challenge was flagged as medium and we 2nd blooded the challenge/

1. Fuzz and find the container name

As it is related to azure blob storage the conventional approach is to use a fuzzing tool to search for common container names. I used this tool called goblobarrow-up-right and it comes preinstalled with some useful wordlists. The tool gave me this result:

[~] Analyzing container 'storage' in account 'greatwall' (page 1) [+][C=200] https://greatwall.blob.core.windows.net/storage?restype=container [~][1/1] Finished searching account 'greatwall'

2. Exploring the container

After we found the storage container let's explore its contents. I prefer to use the Azure Storage Explorer for this because it has an easy GUI and you don't have to worry about request headers. I find a file called connection_info and I open its version history:

The first file had a larger file size, so I just downloaded that file 😂...

3. Examining the zip file

The zip file is password protected... so using John we found that the password is Wall$treet1 . Unlocking it, we get these contents:

4. Connecting to psql database

Using the credentials and psql client we can connect to the provided database. I used this line:

In this exploring the database we find the data that we were looking for:

Last updated