<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Claude on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</title>
    <link>https://arbaazjamadar.com/tags/claude/</link><description>Recent content in Claude  on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</description>

    <generator>Hugo -- gohugo.io</generator>
    <language>en</language><managingEditor>reachout@arbaazjamadar.com (Arbaaz Jamadar)</managingEditor>
      <webMaster>reachout@arbaazjamadar.com (Arbaaz Jamadar)</webMaster><copyright>©2025 arbaazjamadar.com</copyright><lastBuildDate>Sun, 19 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://arbaazjamadar.com/tags/claude/rss.xml" rel="self" type="application/rss+xml" /><item>
        <title>Writeups</title>
        <link>https://arbaazjamadar.com/</link>
        <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/</guid>

        <description>Cloud security research and CVE analysis by Arbaaz Jamadar - 10+ CVEs documented, AWS/Azure/Kubernetes misconfiguration walkthroughs, Wiz CTF top-18 finish, 40+ writeups.</description><category domain="tags">HTB Logging writeup</category><category domain="tags">Logging Writeup</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">Logging</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">HTB</category><category domain="tags">AirTouch</category><category domain="tags">Airmon-ng</category><category domain="tags">Aircrack-ng suite</category><category domain="tags">airodump-ng</category><category domain="tags">aireplay-ng</category><category domain="tags">EAPHammer</category><category domain="tags">Evil-Twin Attack</category><category domain="tags">WPA-PSK</category><category domain="tags">WPA2-MGT</category><category domain="tags">WPA-PEAP</category><category domain="tags">File Upload Bypass</category><category domain="tags">Vlan Pivoting</category><category domain="tags">vlan attack</category><category domain="tags">network penetration</category><category domain="tags">Decrypting packets</category><category domain="tags">wireshark</category><category domain="tags">wpa_supplicant</category><category domain="tags">wpa_supplicant AD config</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: AirTouch</category><category domain="tags">HTB: AirTouch</category><category domain="tags">Information Gathering</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Trust Issues</category><category domain="tags">Incident Response</category><category domain="tags">Compromised Incident</category><category domain="tags">Trust Issues</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Trust Issues</category><category domain="tags">Wiz: Issues</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">supply chain</category><category domain="tags">supply chain vulnerability</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">IaC security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: State of Affairs</category><category domain="tags">State of Affairs</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Terraform</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="tags">AWS</category><category domain="tags">Cloud Security</category><category domain="tags">CTF Writeup</category><category domain="tags">S3</category><category domain="tags">SSRF</category><category domain="tags">IMDSv2</category><category domain="tags">Spring Boot Actuator</category><category domain="tags">Misconfigurations</category><category domain="tags">IAM Roles</category><category domain="tags">Reverse-Proxy</category><category domain="tags">Least Privilege</category><category domain="tags">VPC Endpoint</category><category domain="tags">DevSecOps</category><category domain="tags">Cloud Misconfiguration</category><category domain="tags">WIZ</category><category domain="tags">Observability</category><category domain="tags">CTF</category><category domain="tags">WIZ Perimeter Leak</category><category domain="tags">OSINT</category><category domain="tags">SUBDOMAIN Enumeration</category><category domain="tags">Subdomain enumeration using OSINT tools</category><category domain="tags">DNS RECON</category><category domain="tags">Exploiting chain supply vulnerabilities</category><category domain="tags">Vibe coding vulnerabilities</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Subdomain enumeration using DNS recon</category><category domain="tags">Active recon</category><category domain="tags">Passive Recon</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Happy Birthday</category><category domain="tags">Data Exfil</category><category domain="tags">Compromised Incident</category><category domain="tags">Happy Birthday</category><category domain="tags">wiz</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Happy Birthday</category><category domain="tags">Wiz: Birhtday</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">Loose Policies</category><category domain="tags">Loosely configured StringLike Conditional Checks</category><category domain="tags">Bypass StringLike</category><category domain="tags">SNS topic Exfil</category><category domain="tags">Enumerate S3 buckets</category><category domain="tags">Account ID derivation</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Kubernetes security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: Game of Pods</category><category domain="tags">Game of Pods</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Kubernetes</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="tags">CVE-2022-3294</category><category domain="tags">nodes/proxy</category><category domain="tags">nodes/status</category><category domain="tags">Lateral movement</category><category domain="tags">abusing secrets</category><category domain="tags">abusing service account tokens</category><category domain="tags">k8s-debug-bridge</category><category domain="tags">docker breakout</category><category domain="tags">container escape CTF</category><category domain="tags">postgresql superuser rce</category><category domain="tags">tcpdump capture credentials</category><category domain="tags">linux core_pattern privilege escalation</category><category domain="tags">kubernetes pod security</category><category domain="tags">seccomp apparmor selinux</category><category domain="tags">defense in depth containers</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Confession Booth</category><category domain="tags">go</category><category domain="tags">race conditions</category><category domain="tags">confessions</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">AI assisted</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Confession Booth</category><category domain="tags">Wiz: Confession</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Azure Graph API exploitation</category><category domain="tags">Azure</category><category domain="tags">Entra ID</category><category domain="tags">Monitoring</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Networking</category><category domain="tags">OAuth client credentials abuse</category><category domain="tags">Azure guest access</category><category domain="tags">Graph API</category><category domain="tags">dynamic group privilege escalation</category><category domain="tags">Azure blob storage exfiltration</category><category domain="tags">Entra ID admin consent abuse</category><category domain="tags">Azure security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">Breaking The Barriers</category><category domain="tags">HTB</category><category domain="tags">cctv</category><category domain="tags">linux</category><category domain="tags">zoneminder</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: cctv</category><category domain="tags">HTB: cctv</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">HTB writeup</category><category domain="tags">HTB devarea writeup</category><category domain="tags">devarea Writeup</category><category domain="tags">apache cxf</category><category domain="tags">cxf</category><category domain="tags">syswatch</category><category domain="tags">world writable bash</category><category domain="tags">hoverfly</category><category domain="tags">hoverfly rce</category><category domain="tags">ssrf</category><category domain="tags">file wrapper</category><category domain="tags">command injection</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">devarea</category><category domain="tags">linux</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: devarea</category><category domain="tags">HTB: devarea</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">Privilege Escalation</category><category domain="tags">Privilege Abuse</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">facts</category><category domain="tags">linux</category><category domain="tags">cameleon cms</category><category domain="tags">Mass Assignment</category><category domain="tags">S3 Data Leak</category><category domain="tags">Misconfigured SUID</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: facts</category><category domain="tags">HTB: facts</category><category domain="tags">Garfield</category><category domain="tags">Windows</category><category domain="tags">Active Directory</category><category domain="tags">Golden Ticket</category><category domain="tags">rbcd</category><category domain="tags">rbcd abuse</category><category domain="tags">rodc</category><category domain="tags">ForceChangePassword</category><category domain="tags">RODC KeyList</category><category domain="tags">Keylist attack</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: Garfield</category><category domain="tags">HTB: Garfield</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">msDS-RevealOnDemandGroup</category><category domain="tags">interpreter</category><category domain="tags">linux</category><category domain="tags">mirth connect</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: interpreter</category><category domain="tags">HTB: interpreter</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2023-43208</category><category domain="tags">CVE-2023-37679</category><category domain="tags">kobold</category><category domain="tags">linux</category><category domain="tags">arcane</category><category domain="tags">privatebin</category><category domain="tags">mcpjam</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: kobold</category><category domain="tags">HTB: kobold</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2026-23744</category><category domain="tags">CVE-2025-64714</category><category domain="tags">Active Directory</category><category domain="tags">Assumed Breach</category><category domain="tags">Pre2k</category><category domain="tags">gMSA</category><category domain="tags">NTLM relay</category><category domain="tags">Coerce</category><category domain="tags">Delagation</category><category domain="tags">SPN Jacking</category><category domain="tags">Constrained Delegation</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: pirate</category><category domain="tags">HTB: pirate</category><category domain="tags">Pterodactyl</category><category domain="tags">Linux</category><category domain="tags">PAM</category><category domain="tags">PHP PearCMD</category><category domain="tags">Unauthenticated RCE</category><category domain="tags">Suse</category><category domain="tags">RCE</category><category domain="tags">udisks</category><category domain="tags">race condition</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: Pterodactyl</category><category domain="tags">HTB: Pterodactyl</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2025-6018</category><category domain="tags">CVE-2025-6019</category><category domain="tags">HTB silentium writeup</category><category domain="tags">silentium Writeup</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">silentium</category><category domain="tags">linux</category><category domain="tags">docker</category><category domain="tags">git</category><category domain="tags">symlinks</category><category domain="tags">service abuse</category><category domain="tags">privilege escalation</category><category domain="tags">gogs</category><category domain="tags">flowai</category><category domain="tags">password reset</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: silentium</category><category domain="tags">HTB: silentium</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">subdomain</category><category domain="tags">Privilege Escalation</category><category domain="tags">nginx</category><category domain="tags">Privilege Abuse</category><category domain="tags">CVE-2025-59528</category><category domain="tags">CVE-2025-58434</category><category domain="tags">CVE-2025-64111</category><category domain="tags">variatype</category><category domain="tags">nxc</category><category domain="tags">linux</category><category domain="tags">fonttools</category><category domain="tags">cronjob</category><category domain="tags">fontforge</category><category domain="tags">setuptools</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: VariaType</category><category domain="tags">HTB: VariaType</category><category domain="tags">HTB</category><category domain="tags">wingdata</category><category domain="tags">Linux</category><category domain="tags">tarslip</category><category domain="tags">filter bypass</category><category domain="tags">Unauthenticated RCE</category><category domain="tags">WingFTP</category><category domain="tags">RCE</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: wingdata</category><category domain="tags">HTB: wingdata</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browser Security</category></item><item>
        <title>Wiz: The Ultimate Cloud Security Championship</title>
        <link>https://arbaazjamadar.com/wiz/</link>
        <pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/</guid>

        <description>My approach to solve and detect the real world cloud challenges and misconfigurations.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Trust Issues</category><category domain="tags">Incident Response</category><category domain="tags">Compromised Incident</category><category domain="tags">Trust Issues</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Trust Issues</category><category domain="tags">Wiz: Issues</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">supply chain</category><category domain="tags">supply chain vulnerability</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">IaC security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: State of Affairs</category><category domain="tags">State of Affairs</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Terraform</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="tags">AWS</category><category domain="tags">Cloud Security</category><category domain="tags">CTF Writeup</category><category domain="tags">S3</category><category domain="tags">SSRF</category><category domain="tags">IMDSv2</category><category domain="tags">Spring Boot Actuator</category><category domain="tags">Misconfigurations</category><category domain="tags">IAM Roles</category><category domain="tags">Reverse-Proxy</category><category domain="tags">Least Privilege</category><category domain="tags">VPC Endpoint</category><category domain="tags">DevSecOps</category><category domain="tags">Cloud Misconfiguration</category><category domain="tags">WIZ</category><category domain="tags">Observability</category><category domain="tags">CTF</category><category domain="tags">WIZ Perimeter Leak</category><category domain="tags">OSINT</category><category domain="tags">SUBDOMAIN Enumeration</category><category domain="tags">Subdomain enumeration using OSINT tools</category><category domain="tags">DNS RECON</category><category domain="tags">Exploiting chain supply vulnerabilities</category><category domain="tags">Vibe coding vulnerabilities</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Subdomain enumeration using DNS recon</category><category domain="tags">Active recon</category><category domain="tags">Passive Recon</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Happy Birthday</category><category domain="tags">Data Exfil</category><category domain="tags">Compromised Incident</category><category domain="tags">Happy Birthday</category><category domain="tags">wiz</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Happy Birthday</category><category domain="tags">Wiz: Birhtday</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">Loose Policies</category><category domain="tags">Loosely configured StringLike Conditional Checks</category><category domain="tags">Bypass StringLike</category><category domain="tags">SNS topic Exfil</category><category domain="tags">Enumerate S3 buckets</category><category domain="tags">Account ID derivation</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Kubernetes security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: Game of Pods</category><category domain="tags">Game of Pods</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Kubernetes</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="tags">CVE-2022-3294</category><category domain="tags">nodes/proxy</category><category domain="tags">nodes/status</category><category domain="tags">Lateral movement</category><category domain="tags">abusing secrets</category><category domain="tags">abusing service account tokens</category><category domain="tags">k8s-debug-bridge</category><category domain="tags">docker breakout</category><category domain="tags">container escape CTF</category><category domain="tags">postgresql superuser rce</category><category domain="tags">tcpdump capture credentials</category><category domain="tags">linux core_pattern privilege escalation</category><category domain="tags">kubernetes pod security</category><category domain="tags">seccomp apparmor selinux</category><category domain="tags">defense in depth containers</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Confession Booth</category><category domain="tags">go</category><category domain="tags">race conditions</category><category domain="tags">confessions</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">AI assisted</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Confession Booth</category><category domain="tags">Wiz: Confession</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Azure Graph API exploitation</category><category domain="tags">Azure</category><category domain="tags">Entra ID</category><category domain="tags">Monitoring</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Networking</category><category domain="tags">OAuth client credentials abuse</category><category domain="tags">Azure guest access</category><category domain="tags">Graph API</category><category domain="tags">dynamic group privilege escalation</category><category domain="tags">Azure blob storage exfiltration</category><category domain="tags">Entra ID admin consent abuse</category><category domain="tags">Azure security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">Breaking The Barriers</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Trust Issues</title>
        <link>https://arbaazjamadar.com/wiz/wiz-trust-issues/</link>
        <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/wiz-trust-issues/</guid>

        <description>Exploiting Race condition to gain access to the web app as admin</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Trust Issues</category><category domain="tags">Incident Response</category><category domain="tags">Compromised Incident</category><category domain="tags">Trust Issues</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Trust Issues</category><category domain="tags">Wiz: Issues</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">supply chain</category><category domain="tags">supply chain vulnerability</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Race condition</category><category domain="categories">Static code analysis</category><category domain="categories">Application Security</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Confession Booth</title>
        <link>https://arbaazjamadar.com/wiz/wiz-confession-booth/</link>
        <pubDate>Sat, 21 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/wiz-confession-booth/</guid>

        <description>Exploiting Race condition to gain access to the web app as admin</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Confession Booth</category><category domain="tags">go</category><category domain="tags">race conditions</category><category domain="tags">confessions</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">AI assisted</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Confession Booth</category><category domain="tags">Wiz: Confession</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Race condition</category><category domain="categories">Static code analysis</category><category domain="categories">Application Security</category></item>
  </channel>
</rss>
