Kabinet's GitBook
  • 🚩Kabinet CTF's Writeups
  • Page
  • 2025
    • Thuderdome
      • Emerge through the breach
      • Pulled from the sky
      • An absent defense
      • A new wave (web of deceit)
      • Crossing the great divide
      • Joining forces as one
      • Infiltrate (open the gate)
      • Jaeger
      • Victory
  • 2024
    • GreyCTF 2024
      • Markdown Parser
      • Fearless Concurrency
      • GreyCTF Survey
      • Baby Web
      • Beautiful Styles
      • All About Timing
      • Poly Playground
    • TetCTF 2024
      • Hello from API GW
      • Microservices
  • 2023
    • BSidesSF Cloud Village CTF
      • Tony Tony Tony
      • Plain Sight
      • A Suit of Armor Around The World
      • Sharing is Caring + Sequel
      • Photo Drive
    • DART CTF
      • Flag 1
      • Flag 2
      • Flag 3
      • Flag 4
      • Flag 5
      • Flag 6
      • Flag 7
      • Flag 8
      • Flag 9
      • Flag 10
    • EKS Cluster Games
    • Big IAM Challenge
  • 2022
    • Stack The Flag
      • Secret of Meow Olympurr
  • Authored
    • Cyber League 2025 Major 1
      • Perfect Storage
      • catalog commits
      • pawtainer hub
    • Lag and Crash 2023
      • Managed Secrets
      • Pickle Rick
      • Cloudy with a chance of meatball
    • NYP InfoSec December CTF 2022
      • Super Secure Technology Infrastructure
      • Self Introduction
      • Aww Cuter Cat
      • Obligatory Calc
      • BreadSecurity
  • NYP InfoSec Introduction to Pentesting Workshop
Powered by GitBook
On this page
  • Challenge Description
  • Solution

Was this helpful?

  1. 2023
  2. BSidesSF Cloud Village CTF

Plain Sight

PreviousTony Tony TonyNextA Suit of Armor Around The World

Last updated 2 years ago

Was this helpful?

Challenge Description

People hide all sorts of things in the most obvious places. I'm getting tired of finding them on the Internet.

Take for example, this website that I'm poking around. This one clearly has the flag kept in the most obvious of places. I, for one, believe the developer relied on Azure's crappy documentation to assume that the flag will not be found.

Can you take this on and report to us with the flag, please?

Start here -

Solution

Viewing the page source, I identified that there are multiple javascript file attached via Azure Blob Storage

https://pubaccess.blob.core.windows.net/pubaccess/file.js
https://pubaccess.blob.core.windows.net/pubaccess/file2.js
https://pubaccess.blob.core.windows.net/pubaccess/file3.js
https://pubaccess.blob.core.windows.net/pubaccess/file4.js
https://pubaccess.blob.core.windows.net/pubaccess/file5.js

In the , there are instructions on how to retrieve the flag.

console.log('File.js loaded successfully.');

// This script is responsible for processing and managing data related to a certain aspect of computer security
// It comprises functionality to handle inputs, work with remote resources, and visualize information
//dir,filename= "s3cr3tacc3ss","cred"

// Additional information about processing can be found in the provided technical documents
// To understand the remote resource structure, refer to the associated documentation

// Ensure to use the proper authentication details and adhere to best practices for secure handling
// Locate the authentication details in a separate file, following the pattern: /{dir}/[filename].js

// Stage 1: Obtain user inputs
// Include code to collect and verify user inputs here

// Stage 2: Process and validate the inputs
// Check that inputs adhere to the required format and structure

// Stage 3: Communicate with the necessary remote resources using the user inputs
// Request and obtain data from the relevant remote resources

// Stage 4: Visualize and display the obtained data
// Format and present the data on the web page
//const hidden = 'flag-{F!1@r3w4%ll$sVuln3r4b1^l1tyM4n4g3m3nt}';
//console.log(hidden.replace(/[%#!@$^]/g, ''));

Running the javascript code in console, I retrieved the original flag.

Flag: flag-{F1r3w4llsVuln3r4b1l1tyM4n4g3m3nt}

Following the instructions I visited and retrieved the flag

http://20.42.97.190/
file5.js
https://pubaccess.blob.core.windows.net/s3cr3tacc3ss/cred.js