AdaniKamal
  • 🇲🇾Selamat Datang
  • CVE-2024-3400 PAN-OS
    • Version Table
    • panos-check.py
  • Script4u
    • Cipher checker
      • CipherChecker.py
    • Nmap & Ciphers
      • nmap-ciphers.py
      • iplist.txt
    • Ping Bulk
      • ping.py
      • hosts.txt
    • Telnet bulk
      • telnet.py
    • purrfect-cipher-scanner
      • cipher-scanner.py
    • speech2text.py
    • SSL Scan
      • ssl-scanner.py
  • Walkthrough
    • CTF - Walkthrough
    • TryHackMe
      • Authentication Bypass
      • HOLO
      • John The Ripper
      • RES
      • ToolsRUs
      • Anonforce
      • RootMe
      • stealthcopter ctf primer1
      • c4ptur3-th3-fl4g
      • Wonderland
      • Bolt
      • CC-Pen Testing
      • CC-Stego
      • CTF collection Vol.1
      • Crack The Hash
      • Easy steganography
      • Web Fundamentals
      • Hydra
      • Lian_Yu
      • NerdHerd
      • OhSINT
      • STEGOsaurus
      • Custom Wordlist
        • Custom Wordlists
        • Custom Wordlists
      • Advent of Cyber 2020
        • Day3 - Evil Elf
        • Day 5 - Ho-Ho-Hosint
        • Day 6 - Data Elf-iltration
        • Day 12 - Elfcryption
        • Day 14 - Unknown storage
    • 3108 CTF 2024 : Kembara Tuah
  • CTF Tool
    • File Header
Powered by GitBook
On this page
  1. Walkthrough
  2. TryHackMe
  3. Advent of Cyber 2020

Day 14 - Unknown storage

image

Bucket name: advent-bucket-one

##Q1 - What is the name of the file you found?

curl advent-bucket-one.s3.amazonaws.com | xmllint --format -
  • gets a copy of the page which is comprised of an XML document

  • xmllint will give us a pretty printed version of the file

image

##Q2 - What is in the file?

curl advent-bucket-one.s3.amazonaws.com/employee_names.txt

By AdaniKamal

PreviousDay 12 - ElfcryptionNext3108 CTF 2024 : Kembara Tuah

Last updated 10 months ago