Flag 9
Continuing on with the enumeration of the key vault, there are few other secrets within it.
0704d1bc-950f-42c8-b0cd-c0569d111da1
Ascension
Flag8
Flag9
Attempting to list Flag9 will show a forbidden error.

I decided to use MicroBurst Get-AzPasswords as I didnt want to manually list the remaining secrets. I refer to this NETSPI blog on how to utilize the Get-AzPasswords
Luckily I used the Get-AzPasswords as I wasn’t aware that the user has the ability to retrieve the key vault keys LICIACube.

In the 0704d1bc-950f-42c8-b0cd-c0569d111da1 secret, it shows an encrypted text. After some googling, I found this article that shows how to decrypt using the key vault key.

With the new set of credentials, I attempt to login using the Connect-AzAccount cmdlets.

Running Get-AzResource shows the service principal having access to a cosmosdb and key vault.

I am then able to retrieve the Flag9 from the keyvault now.

Flag 9 : Prepare for impact!
Last updated
Was this helpful?