IMPORTANT:AttackDefense Labs is included with a Pentester Academy subscription! Upgrade Now to access over 1800+ Labs.

Already a Pentester Academy student? Your access will continue uninterrupted. Please use the same Google account to login here.

Not a Pentester Academy student? Try our Free Communitiy Labs

[Retired] Cloud Security CTF: Serverless Edition: [Nov 6-10]

weekly-ctf-all | Level: Easy  | Total Lab Runs: 0 | Premium Lab

Lab Scoreboard

This CTF contest has concluded. The compressed solution PDF manual can be downloaded from above.

If you face difficulty in viewing the images in the compressed PDF manual, download High-Quality solution PDF manual from here.

Welcome to our Weekly CTF Contest!

CTF Description: 

With serverless computing, the developers no longer have to worry about servers. The infrastructure management tasks like capacity provisioning, patching, etc. are handled by the cloud service provider allowing developers to focus only on writing the code.

Functions and events are the core components of serverless computing. When an event happens, a function is triggered and the code gets executed. 

AWS Lambda is the serverless computing platform provided by Amazon. Lambda functions are stateless allowing Amazon to launch as many copies of the function as needed for scaling. 

Serverless architecture is said to be more secure compared to traditional architectures. However, this does not mean that attacks cannot be performed on it. This CTF is focused on services such as AWS Lambda, API Gateway, and how a vulnerable Lambda function can be leveraged to perform operations that the user is not allowed to do.

Objective:

Collect all 7 FLAGs named: ServerlessFLAG1, ServerlessFLAG2, ServerlessFLAG3, ServerlessFLAG4 (Resource ARN), ServerlessFLAG5, ServerlessFLAG6 (Version) and ServerlessFLAG.

There could be other FLAG names in the same environment hence we have mentioned the specific flag names above.

Level:

Intermediate.

Instructions:

  • Click on RUN to start the lab (takes approximately 25s).

  • Click on LAB LINK to view the Access Key Id and Secret Key of a read-only user account.

  • Interact with API Gateway, AWS Lambda, and recover seven flags. 

  • Apart from ServerlessFLAG4 and ServerlessFLAG6, the flags are named as ServerlessFLAG1, ServerlessFLAG2, ServerlessFLAG3, ServerlessFLAG5 and ServerlessFLAG7

  • ServerlessFLAG4 is ARN of the event source which triggers "Monitor" Lambda function

  • ServerlessFLAG6 is the version of the package used by the "FileUploader" Lambda function.

Rules:

  • Collect all 7 FLAGs named: ServerlessFLAG1, ServerlessFLAG2, ServerlessFLAG3, ServerlessFLAG4 (Resource ARN), ServerlessFLAG5, ServerlessFLAG6 (Version) and ServerlessFLAG7

  • Once you verify the flags, email attackdefense@pentesteracademy.com with a short report on the process and the email you used to register on this website.

  • Reply to our Twitter posts to let us know you've submitted your report. 

  • This CTF contest will start on 0000hrs Nov 06, 2020 ET and end on 2359hrs Nov 10, 2020 ET.

  • The first person to capture all the flags gets a Raspberry Pi 400 + 1-month subscription + Pentester Academy T-shirt

  • Second and third to capture all the flags will get a 1-month subscription + Pentester Academy T-shirt

  • 3 other participants who capture all the flags will be selected randomly to win 1-month subscriptions! These will be picked randomly from the remaining correct submissions coming in upto 2359hrs Nov 10, 2020 ET

  • Winners will be contacted on Nov 11-12, 2020

  • All decisions from our team will be final. 


Verify:
1. ServerlessFLAG1
 
2. ServerlessFLAG2
 
3. ServerlessFLAG3
 
4. ServerlessFLAG4 (Event Source ARN)
 
5. ServerlessFLAG5
 
6. ServerlessFLAG6 (Version)
 
7. ServerlessFLAG7
 

The following activities are strictly prohibited on this website unless otherwise explicitly stated as allowed in the mission statement:

  • Using automated scanners
  • Using brute force attacks
  • Denial of Service attacks
  • Attacking other student machines in challenges where you might achieve a shell on the vulnerable system
  • Attacking the lab infrastructure

Users violating the above will be either temporarily or permanently banned from the website. 

If you are unsure about an activity, then please contact support to confirm that it is allowed on our website.

Technical Support for this Lab:

There is a reason we provide unlimited lab time: you can take as much time as you need to solve a lab. However, we realize that sometimes hints might be necessary to keep you motivated!

We currently provide technical support limited to:

  • Giving hints for a lab exercise
  • In rare circumstances, if you have totally given up (NO!!!) then tell you how to solve it. This will be limited to sharing the solution video or lab report
  • A lab exercise fails to load or has errors in it

If you need technical support, please email  attackdefense@pentesteracademy.com  clearly mention the name and link of the lab exercise and other essential details. The more descriptive you are, the faster we can help you. We will get back to you within 24 hours or less. 

For adminitrative queries, billing, enterprise accounts etc. please email feedback@binarysecuritysolutions.com