My Aquarium
We are given a remote web application that has 3 simple buttons:

Checking the source code, one of the buttons has an interesting URL: https://onlineaquarium.blob.core.windows.net/aquarium/resources/sea-animal-facts.txt
Visiting it, it contains a text file:
Sea Animal Facts:
...
-
Credits to : noaa.gov
But this is likely what we need to look at, as the URL implies there are other resources available!
Looking at the Microsoft Documentation for listing blob storage resources, the user can query the resources with /<NAME>?comp=list&include=metadata.
Letโs test that on the target: https://onlineaquarium.blob.core.windows.net/aquarium?comp=list&include=metadata

The highlighted entry in the screenshot has a โsecretโ file!
Visiting the file at https://onlineaquarium.blob.core.windows.net/aquarium/resources/SecretFavoriteSeaAnimal.txt contains the flag!
Flag: DawgCTF{Bl0b_F15h_4re_S1lly}
Related Writeups
l33t-benign
Now that you've figured out who was behind this operation, can you figure out who else was affected?
4spam
In the wake of last week's events, we've created a replacement (https://4spam.umbccd.net/). An old dump of some of the ...
Caddyshack
locate and connect to the server running on caddyshack.umbccd.net