<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Devarea Writeup on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</title>
    <link>https://arbaazjamadar.com/tags/devarea-writeup/</link><description>Recent content in Devarea Writeup  on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</description>

    <generator>Hugo -- gohugo.io</generator>
    <language>en</language><managingEditor>reachout@arbaazjamadar.com (Arbaaz Jamadar)</managingEditor>
      <webMaster>reachout@arbaazjamadar.com (Arbaaz Jamadar)</webMaster><copyright>©2025 arbaazjamadar.com</copyright><lastBuildDate>Sun, 19 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://arbaazjamadar.com/tags/devarea-writeup/rss.xml" rel="self" type="application/rss+xml" /><item>
        <title>Writeups</title>
        <link>https://arbaazjamadar.com/</link>
        <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/</guid>

        <description>Cloud security research and CVE analysis by Arbaaz Jamadar - 10+ CVEs documented, AWS/Azure/Kubernetes misconfiguration walkthroughs, Wiz CTF top-18 finish, 40+ writeups.</description><category domain="tags">HTB Logging writeup</category><category domain="tags">Logging Writeup</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">Logging</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">HTB</category><category domain="tags">AirTouch</category><category domain="tags">Airmon-ng</category><category domain="tags">Aircrack-ng suite</category><category domain="tags">airodump-ng</category><category domain="tags">aireplay-ng</category><category domain="tags">EAPHammer</category><category domain="tags">Evil-Twin Attack</category><category domain="tags">WPA-PSK</category><category domain="tags">WPA2-MGT</category><category domain="tags">WPA-PEAP</category><category domain="tags">File Upload Bypass</category><category domain="tags">Vlan Pivoting</category><category domain="tags">vlan attack</category><category domain="tags">network penetration</category><category domain="tags">Decrypting packets</category><category domain="tags">wireshark</category><category domain="tags">wpa_supplicant</category><category domain="tags">wpa_supplicant AD config</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: AirTouch</category><category domain="tags">HTB: AirTouch</category><category domain="tags">Information Gathering</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Trust Issues</category><category domain="tags">Incident Response</category><category domain="tags">Compromised Incident</category><category domain="tags">Trust Issues</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Trust Issues</category><category domain="tags">Wiz: Issues</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">supply chain</category><category domain="tags">supply chain vulnerability</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">IaC security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: State of Affairs</category><category domain="tags">State of Affairs</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Terraform</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="tags">AWS</category><category domain="tags">Cloud Security</category><category domain="tags">CTF Writeup</category><category domain="tags">S3</category><category domain="tags">SSRF</category><category domain="tags">IMDSv2</category><category domain="tags">Spring Boot Actuator</category><category domain="tags">Misconfigurations</category><category domain="tags">IAM Roles</category><category domain="tags">Reverse-Proxy</category><category domain="tags">Least Privilege</category><category domain="tags">VPC Endpoint</category><category domain="tags">DevSecOps</category><category domain="tags">Cloud Misconfiguration</category><category domain="tags">WIZ</category><category domain="tags">Observability</category><category domain="tags">CTF</category><category domain="tags">WIZ Perimeter Leak</category><category domain="tags">OSINT</category><category domain="tags">SUBDOMAIN Enumeration</category><category domain="tags">Subdomain enumeration using OSINT tools</category><category domain="tags">DNS RECON</category><category domain="tags">Exploiting chain supply vulnerabilities</category><category domain="tags">Vibe coding vulnerabilities</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Subdomain enumeration using DNS recon</category><category domain="tags">Active recon</category><category domain="tags">Passive Recon</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Happy Birthday</category><category domain="tags">Data Exfil</category><category domain="tags">Compromised Incident</category><category domain="tags">Happy Birthday</category><category domain="tags">wiz</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Happy Birthday</category><category domain="tags">Wiz: Birhtday</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">Loose Policies</category><category domain="tags">Loosely configured StringLike Conditional Checks</category><category domain="tags">Bypass StringLike</category><category domain="tags">SNS topic Exfil</category><category domain="tags">Enumerate S3 buckets</category><category domain="tags">Account ID derivation</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Kubernetes security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: Game of Pods</category><category domain="tags">Game of Pods</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Kubernetes</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="tags">CVE-2022-3294</category><category domain="tags">nodes/proxy</category><category domain="tags">nodes/status</category><category domain="tags">Lateral movement</category><category domain="tags">abusing secrets</category><category domain="tags">abusing service account tokens</category><category domain="tags">k8s-debug-bridge</category><category domain="tags">docker breakout</category><category domain="tags">container escape CTF</category><category domain="tags">postgresql superuser rce</category><category domain="tags">tcpdump capture credentials</category><category domain="tags">linux core_pattern privilege escalation</category><category domain="tags">kubernetes pod security</category><category domain="tags">seccomp apparmor selinux</category><category domain="tags">defense in depth containers</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Confession Booth</category><category domain="tags">go</category><category domain="tags">race conditions</category><category domain="tags">confessions</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">AI assisted</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Confession Booth</category><category domain="tags">Wiz: Confession</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Azure Graph API exploitation</category><category domain="tags">Azure</category><category domain="tags">Entra ID</category><category domain="tags">Monitoring</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Networking</category><category domain="tags">OAuth client credentials abuse</category><category domain="tags">Azure guest access</category><category domain="tags">Graph API</category><category domain="tags">dynamic group privilege escalation</category><category domain="tags">Azure blob storage exfiltration</category><category domain="tags">Entra ID admin consent abuse</category><category domain="tags">Azure security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">Breaking The Barriers</category><category domain="tags">HTB</category><category domain="tags">cctv</category><category domain="tags">linux</category><category domain="tags">zoneminder</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: cctv</category><category domain="tags">HTB: cctv</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">HTB writeup</category><category domain="tags">HTB devarea writeup</category><category domain="tags">devarea Writeup</category><category domain="tags">apache cxf</category><category domain="tags">cxf</category><category domain="tags">syswatch</category><category domain="tags">world writable bash</category><category domain="tags">hoverfly</category><category domain="tags">hoverfly rce</category><category domain="tags">ssrf</category><category domain="tags">file wrapper</category><category domain="tags">command injection</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">devarea</category><category domain="tags">linux</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: devarea</category><category domain="tags">HTB: devarea</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">Privilege Escalation</category><category domain="tags">Privilege Abuse</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">facts</category><category domain="tags">linux</category><category domain="tags">cameleon cms</category><category domain="tags">Mass Assignment</category><category domain="tags">S3 Data Leak</category><category domain="tags">Misconfigured SUID</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: facts</category><category domain="tags">HTB: facts</category><category domain="tags">Garfield</category><category domain="tags">Windows</category><category domain="tags">Active Directory</category><category domain="tags">Golden Ticket</category><category domain="tags">rbcd</category><category domain="tags">rbcd abuse</category><category domain="tags">rodc</category><category domain="tags">ForceChangePassword</category><category domain="tags">RODC KeyList</category><category domain="tags">Keylist attack</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: Garfield</category><category domain="tags">HTB: Garfield</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">msDS-RevealOnDemandGroup</category><category domain="tags">interpreter</category><category domain="tags">linux</category><category domain="tags">mirth connect</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: interpreter</category><category domain="tags">HTB: interpreter</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2023-43208</category><category domain="tags">CVE-2023-37679</category><category domain="tags">kobold</category><category domain="tags">linux</category><category domain="tags">arcane</category><category domain="tags">privatebin</category><category domain="tags">mcpjam</category><category domain="tags">MotionEye</category><category domain="tags">SQLi Data Leak</category><category domain="tags">Vulnerable Binary</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: kobold</category><category domain="tags">HTB: kobold</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2026-23744</category><category domain="tags">CVE-2025-64714</category><category domain="tags">Active Directory</category><category domain="tags">Assumed Breach</category><category domain="tags">Pre2k</category><category domain="tags">gMSA</category><category domain="tags">NTLM relay</category><category domain="tags">Coerce</category><category domain="tags">Delagation</category><category domain="tags">SPN Jacking</category><category domain="tags">Constrained Delegation</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: pirate</category><category domain="tags">HTB: pirate</category><category domain="tags">Pterodactyl</category><category domain="tags">Linux</category><category domain="tags">PAM</category><category domain="tags">PHP PearCMD</category><category domain="tags">Unauthenticated RCE</category><category domain="tags">Suse</category><category domain="tags">RCE</category><category domain="tags">udisks</category><category domain="tags">race condition</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: Pterodactyl</category><category domain="tags">HTB: Pterodactyl</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">reversing</category><category domain="tags">Privilege Escalation</category><category domain="tags">CVE-2025-6018</category><category domain="tags">CVE-2025-6019</category><category domain="tags">HTB silentium writeup</category><category domain="tags">silentium Writeup</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">silentium</category><category domain="tags">linux</category><category domain="tags">docker</category><category domain="tags">git</category><category domain="tags">symlinks</category><category domain="tags">service abuse</category><category domain="tags">privilege escalation</category><category domain="tags">gogs</category><category domain="tags">flowai</category><category domain="tags">password reset</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: silentium</category><category domain="tags">HTB: silentium</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">subdomain</category><category domain="tags">Privilege Escalation</category><category domain="tags">nginx</category><category domain="tags">Privilege Abuse</category><category domain="tags">CVE-2025-59528</category><category domain="tags">CVE-2025-58434</category><category domain="tags">CVE-2025-64111</category><category domain="tags">variatype</category><category domain="tags">nxc</category><category domain="tags">linux</category><category domain="tags">fonttools</category><category domain="tags">cronjob</category><category domain="tags">fontforge</category><category domain="tags">setuptools</category><category domain="tags">Command Injection</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: VariaType</category><category domain="tags">HTB: VariaType</category><category domain="tags">HTB</category><category domain="tags">wingdata</category><category domain="tags">Linux</category><category domain="tags">tarslip</category><category domain="tags">filter bypass</category><category domain="tags">Unauthenticated RCE</category><category domain="tags">WingFTP</category><category domain="tags">RCE</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: wingdata</category><category domain="tags">HTB: wingdata</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browser Security</category></item><item>
        <title>HackTheBox: devarea</title>
        <link>https://arbaazjamadar.com/htb/hackthebox-devarea/</link>
        <pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/htb/hackthebox-devarea/</guid>

        <description>Initial foothold by leaking credentials using SSRF from Apache CXF, and using creds to execute RCE on Hoverfly dashboard. Privilege escalation via, exploiting the world writable bash and executing the syswatch script.</description><category domain="tags">Security</category><category domain="tags">Security Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">HTB writeup</category><category domain="tags">HTB devarea writeup</category><category domain="tags">devarea Writeup</category><category domain="tags">apache cxf</category><category domain="tags">cxf</category><category domain="tags">syswatch</category><category domain="tags">world writable bash</category><category domain="tags">hoverfly</category><category domain="tags">hoverfly rce</category><category domain="tags">ssrf</category><category domain="tags">file wrapper</category><category domain="tags">command injection</category><category domain="tags">Misconfigurations</category><category domain="tags">security writeup</category><category domain="tags">HTB</category><category domain="tags">devarea</category><category domain="tags">linux</category><category domain="tags">Lateral Pivoting</category><category domain="tags">HTB</category><category domain="tags">HackTheBox</category><category domain="tags">HackTheBox: devarea</category><category domain="tags">HTB: devarea</category><category domain="tags">Information Gathering</category><category domain="tags">Initial Enumeration</category><category domain="tags">Privilege Escalation</category><category domain="tags">Privilege Abuse</category><category domain="categories">Box Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Browsed Security</category><category domain="categories">API Security</category></item>
  </channel>
</rss>
