CipherSpokes NetOps

Checking the DNS, we can see that the challenge is hosted on AWS S3.

Since the challenge hint mentioned fuzzing, lets fuzz for other possible bucket name.

We got a hit on gateway.hexnova.quest.
Vieweing the page source of gateway, we found a link to google cloud storage as well as a command to get the flag.

Viewing the index.html, we see multiple reference to a file called key.zip

We are able to then download the key.zip file.

The zip file has a password which is trivial to crack.

With that, we are able to activate the service account and get the flag.

Last updated
Was this helpful?