This Lambda Function URL doesn’t just give you the key like furls1. You have to work a little harder for this one. CloudFox can definitely help you here.
Information Gathering
This time around, I don’t know which lambda function to target, since there’s no “furls2” function. Instead, I will list all the function URLs in the AWS account. (minus the one I’ve already exploited)
| |
Looks like the “auth-me” is my target. I’ll try and visit this URL now.
| |
Seems I will need more information this time around. I’ll try some more aws commands to enumerate this function.
| |
I wasn’t allowed to perform GetFunction, but in the end doing a ListFunctions was all i ever needed!
Execution
| |
So the challenge isn’t over yet. At this point I’ve become familiar with scanning roles and policies so this shouldn’t be an issue.
| |
There’s plenty of policies here, even one named “furls2”. Unfortunately, upon inspection, this is not the one we’re looking for.
| |
Instead, after a bit of trial and error, I found the “mewis” policy, which allows the lambda:ListFunctions action.
| |
Now the question wasn’t which policy permits this kind of action, but finding the role it’s attached to. I’ve documented in the “Backwards” challenge write-up how I go about listing all policies attached to roles in my AWS account.
| |
Lo and behold, the role I was looking for had the same name as the policy attached to it!