flaws.cloud

Level 1

DNS enum:

$ dig +nocmd flaws.cloud
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46135
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;flaws.cloud.            IN    A

;; ANSWER SECTION:
flaws.cloud.        5    IN    A    52.218.176.234

;; Query time: 64 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Sat Aug 28 16:30:43 +0630 2021
;; MSG SIZE  rcvd: 56

$ nslookup 52.218.176.234
234.176.218.52.in-addr.arpa    name = s3-website-us-west-2.amazonaws.com.

Authoritative answers can be found from:

Request s3:

Level 2:

Level 2

Link - http://level2-c8b217a33fcf1f839f6f1f73a00a9ae7.flaws.cloud/arrow-up-right

Create simple user and you will get access key id and access key.

This is my Access key id and key. I copy that.

When i access s3 bucket. I get permission error.

Create a profile with id and key.

Don't forget to create group and add user to this group. Now you can request s3 with this profile.

You will get level 3 link.

Level 3

Link - http://level3-9afd3927f195e10225021a578e6f78df.flaws.cloud/arrow-up-right

First request s3 bucket.

Download all this files.

You will see .git directory and commit history.

View first commit history. You will see access id and key.

Create a profile with this key.

Level 4

Link - http://level4-1156739cfb264ced6de514971a4bef68.flaws.cloudarrow-up-right

Get id by using level3 key.

View all snapshots.

No problem. We know that region from level1.

Check the permission of snapshot.

Create volume with this snapshot.

View Public ip.

Create EC2. In volume tap search snapshots with 0b49342abd1bdcb89 and /dev/sdf. Login to the ec2 instance using ssh key.

List all block devices. We know that snapshots is mount in xvdf.

You will get the level5 link.

Level 5

Link - http://level5-d2891f604d2061b6977c2481b0c8333e.flaws.cloud/243f422c/arrow-up-right

Request via 169.254.169.254

Setup Credential in /.aws/credentials.

Request s3 bucket:

Level 6

Access key ID: AKIAJFQ6E7BY57Q3OBGA Secret: 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

Configure credentials in /.aws/credentials

Get iam-user info:

Get policies info (MySecurityAudit is default):

Get list_apigateways info (ARN Amazon Resource Name):

Get detail about version:

Get all lambda function:

s33ppypa75 is rest-api id.

Final Link

Last updated