| CARVIEW |
Learn about secrets management by finding real secrets hidden in code, configuration files, and cloud infrastructure.
π― How to Play
Your Mission: Find hidden secrets in this repository and enter them to score points!
Where to Look:
- π Source code files (Java, JavaScript, etc.)
- π³ Docker files and configurations
- βοΈ Cloud deployment configurations (AWS, GCP, Azure)
- π§ Environment variables and config files
- ποΈ Vault and secret management tools
Getting Started: Check out the GitHub repository to examine the code and find the secrets!
Pro Tip: Each challenge below has a different difficulty level and may require different environments. Start with the easier ones and work your way up! π
| # | Challenge | Focus | Difficulty | Runs on environment (current: Heroku) | Solved |
|---|---|---|---|---|---|
| 0 | Challenge 0 | Intro | β ββββ | Docker | |
| 1 | Challenge 1 | Git | β ββββ | Docker | |
| 2 | Challenge 2 | Git | β ββββ | Docker | |
| 3 | Challenge 3 | Docker | β ββββ | Docker | |
| 4 | Challenge 4 | Docker | β β βββ | Docker | |
| 5 | Challenge 5 | Configmaps | β β βββ | K8s | |
| 6 | Challenge 6 | Secrets | β β βββ | K8s | |
| 7 | Challenge 7 | Vault | β β β β β | K8s with Vault | |
| 8 | Challenge 8 | Logging | β β βββ | Docker | |
| 9 | Challenge 9 | Terraform | β β β ββ | AWS, GCP, Azure | |
| 10 | Challenge 10 | CSI-Driver | β β β β β | AWS, GCP, Azure | |
| 11 | Challenge 11 | IAM privilege escalation | β β β β β | AWS, GCP, Azure | |
| 12 | Challenge 12 | Docker | β β β ββ | Docker | |
| 13 | Challenge 13 | CI/CD | β β β ββ | Docker | |
| 14 | Challenge 14 | Password Manager | β β β β β | Docker | |
| 15 | Challenge 15 | Git | β β βββ | Docker | |
| 16 | Challenge 16 | Front-end | β β β ββ | Docker | |
| 17 | Challenge 17 | Docker | β β β ββ | Docker | |
| 18 | Challenge 18 | Cryptography | β β β β β | Docker | |
| 19 | Challenge 19 | Binary | β β β β β | Docker | |
| 20 | Challenge 20 | Binary | β β β β β | Docker | |
| 21 | Challenge 21 | Binary | β β β β β | Docker | |
| 22 | Challenge 22 | Binary | β β β β β | Docker | |
| 23 | Challenge 23 | Front-end | β ββββ | Docker | |
| 24 | Challenge 24 | Cryptography | β β βββ | Docker | |
| 25 | Challenge 25 | Web3 | β β βββ | Docker | |
| 26 | Challenge 26 | Web3 | β β βββ | Docker | |
| 27 | Challenge 27 | Web3 | β β βββ | Docker | |
| 28 | Challenge 28 | Documentation | β ββββ | Docker | |
| 29 | Challenge 29 | Documentation | β ββββ | Docker | |
| 30 | Challenge 30 | Front-end | β β βββ | Docker | |
| 31 | Challenge 31 | Front-end | β ββββ | Docker | |
| 32 | Challenge 32 | AI | β β βββ | Docker | |
| 33 | Challenge 33 | Secrets | β β βββ | K8s | |
| 34 | Challenge 34 | Cryptography | β β βββ | Docker | |
| 35 | Challenge 35 | Documentation | β ββββ | Docker | |
| 36 | Challenge 36 | Binary | β β β β β | Docker | |
| 37 | Challenge 37 | CI/CD | β β βββ | Docker | |
| 38 | Challenge 38 | Git | β ββββ | Docker | |
| 39 | Challenge 39 | Cryptography | β ββββ | Docker | |
| 40 | Challenge 40 | Cryptography | β ββββ | Docker | |
| 41 | Challenge 41 | Cryptography | β β β ββ | Docker | |
| 42 | Challenge 42 | Logging | β β βββ | Docker | |
| 43 | Challenge 43 | Documentation | β ββββ | Docker | |
| 44 | Challenge 44 | Vault | β β β β β | K8s with Vault | |
| 45 | Challenge 45 | Vault | β β β β β | K8s with Vault | |
| 46 | Challenge 46 | Vault | β β β β β | K8s with Vault | |
| 47 | Challenge 47 | Vault | β β βββ | K8s with Vault | |
| 48 | Challenge 48 | Secrets | β β βββ | K8s | |
| 49 | Challenge 49 | Cryptography | β β β ββ | Docker | |
| 50 | Challenge 50 | Binary | β β βββ | Docker | |
| 51 | Challenge 51 | Secrets | β β βββ | Docker | |
| 52 | Challenge 52 | Secrets | β β βββ | Docker | |
| 53 | Challenge 53 | Secrets | β β β ββ | K8s | |
| 54 | Challenge 54 | Secrets | β β βββ | Docker | |
| 55 | Challenge 55 | Secrets | β ββββ | Docker | |
| 56 | Challenge 56 | AI | β ββββ | Docker | |
| 57 | Challenge 57 | AI | β β βββ | Docker | |
| 58 | Challenge 58 | Logging | β β βββ | Docker | |
| 59 | Challenge 59 | CI/CD | β β βββ | Docker |
Total score: 0
π Ready to Start?
1. Choose a challenge from the table above
2. Examine the repository - Look at the source code, config files, and documentation
3. Find the secret - It could be in plain text, encoded, or stored in environment variables
4. Enter your answer - Submit the secret to score points!
Hasty? Here is the Vault secret;-)
Star us on Github
- Nanne Baars @nbaars
- Marcin Nowak @drnow4u
- Rodolfo Neves @roddas
- Osama Magdy @osamamagdy
- Shubham Patel @Shubham-Patel07
- za @za
- Divyanshu Dev @Novice-expert
- Pastekitoo @Pastekitoo
- Tibor Hercz @tiborhercz
- Chris Elbring Jr. @neatzsche
- Adarsh A @adarsh-a-tw
- Diamond Rivero @diamant3
- Norbert Wolniak @nwolniak
- Filip Chyla @fchyla
- Dmitry Litosh @Dlitosh
- Vineeth Jagadeesh @djvinnie
- Mahaputra Ilham Awal @mahaputrailhamawal
- Turjo Chowdhury @turjoc120
- SndR @SndR85
- Josh Grossman @tghosth
- alphasec @alphasecio
- CaduRoriz @CaduRoriz
- Madhu Akula @madhuakula
- Mike Woudenberg @mikewoudenberg
- Spyros @northdpole
- RubenAtBinx @RubenAtBinx
- Alex Bender @alex-bender
- Danny Lloyd @dannylloyd
- Nicolas Humblot @nhumblot
- Rick M @kingthorin
- Shlomo Zalman Heigh @szh
- Fern @f3rn0s
- Jeff Tong @Wind010
- 2FA keys
- Activation/Callback links
- API keys
- Credentials
- Passwords
- Private keys (decryption, signing, TLS, SSH, GPG)
- Secret keys (symmetric encryption, HMAC)
- Session cookies
- Tokens (Session, Refresh, Authentication, Activation, etc.)
Check the instructions in the README .