<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Loose Policies on Arbaaz breaks stuff | Incident Response, Threat Modeling, offensive security, CTF writeups, Security Projects, Certifications, Log analysis, SIEM</title>
    <link>https://arbaazjamadar.com/tags/loose-policies/</link><description>Recent content in Loose Policies  on Arbaaz breaks stuff | Incident Response, Threat Modeling, offensive security, CTF writeups, Security Projects, Certifications, Log analysis, SIEM</description>

    <generator>Hugo -- gohugo.io</generator>
    <language>en</language><managingEditor>reachout@arbaazjamadar.com (Arbaaz Jamadar)</managingEditor>
      <webMaster>reachout@arbaazjamadar.com (Arbaaz Jamadar)</webMaster><copyright>©2025 arbaazjamadar.com</copyright><lastBuildDate>Thu, 02 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://arbaazjamadar.com/tags/loose-policies/rss.xml" rel="self" type="application/rss+xml" /><item>
        <title>Wiz The Ultimate Cloud Security Championship: Happy Birthday</title>
        <link>https://arbaazjamadar.com/wiz/wiz-happy-birthday/</link>
        <pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/wiz-happy-birthday/</guid>

        <description>Loose resource policies enable the attacker to perform unauthenticated data exfiltration from S3 bucket. The attacker is able to collect and develop all the resource arn&#39;s via publicly available endpoints.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Happy Birthday</category><category domain="tags">Data Exfil</category><category domain="tags">Compromised Incident</category><category domain="tags">Happy Birthday</category><category domain="tags">wiz</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Happy Birthday</category><category domain="tags">Wiz: Birhtday</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">Loose Policies</category><category domain="tags">Loosely configured StringLike Conditional Checks</category><category domain="tags">Bypass StringLike</category><category domain="tags">SNS topic Exfil</category><category domain="tags">Enumerate S3 buckets</category><category domain="tags">Account ID derivation</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Race condition</category><category domain="categories">Static code analysis</category><category domain="categories">Application Security</category></item>
  </channel>
</rss>
