Pipeline Drift

I threw the key into prowler while I tried out other challenges.

Looking at the prowler output it mention there are sensitive environment plaintext credentials. Lets retreive them.

Using pacu, I identified that the leaky user has access to RDS.

There's a stopped rds snapshop, lets try and copy it out to our own account.

To do that, we will need to add our account ID.

Next we restore the snapshop

Change the snapshop master password, as well as whitelist our own IP address so that we are able to access the RDS.

Now, we are able to use mysql to connect to the RDS and retrieve the flag.

Last updated

Was this helpful?