<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Wiz: The Ultimate Cloud Security Championship on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</title>
    <link>https://arbaazjamadar.com/wiz/</link><description>Recent content in Wiz: The Ultimate Cloud Security Championship  on Security Writeups | HackTheBox | Wiz CTF | AWS Cloud Security | CVE Analysis | Arbaaz Jamadar</description>

    <generator>Hugo -- gohugo.io</generator>
    <language>en</language><managingEditor>reachout@arbaazjamadar.com (Arbaaz Jamadar)</managingEditor>
      <webMaster>reachout@arbaazjamadar.com (Arbaaz Jamadar)</webMaster><copyright>©2025 arbaazjamadar.com</copyright><lastBuildDate>Thu, 02 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://arbaazjamadar.com/wiz/rss.xml" rel="self" type="application/rss+xml" /><item>
        <title>Wiz The Ultimate Cloud Security Championship: Happy Birthday</title>
        <link>https://arbaazjamadar.com/wiz/wiz-happy-birthday/</link>
        <pubDate>Thu, 02 Apr 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/wiz-happy-birthday/</guid>

        <description>Loose resource policies enable the attacker to perform unauthenticated data exfiltration from S3 bucket. The attacker is able to collect and develop all the resource arn&#39;s via publicly available endpoints.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Happy Birthday</category><category domain="tags">Data Exfil</category><category domain="tags">Compromised Incident</category><category domain="tags">Happy Birthday</category><category domain="tags">wiz</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Happy Birthday</category><category domain="tags">Wiz: Birhtday</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">Loose Policies</category><category domain="tags">Loosely configured StringLike Conditional Checks</category><category domain="tags">Bypass StringLike</category><category domain="tags">SNS topic Exfil</category><category domain="tags">Enumerate S3 buckets</category><category domain="tags">Account ID derivation</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Race condition</category><category domain="categories">Static code analysis</category><category domain="categories">Application Security</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Trust Issues</title>
        <link>https://arbaazjamadar.com/wiz/wiz-trust-issues/</link>
        <pubDate>Tue, 24 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/wiz-trust-issues/</guid>

        <description>Exploiting Race condition to gain access to the web app as admin</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Trust Issues</category><category domain="tags">Incident Response</category><category domain="tags">Compromised Incident</category><category domain="tags">Trust Issues</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Trust Issues</category><category domain="tags">Wiz: Issues</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="tags">supply chain</category><category domain="tags">supply chain vulnerability</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Race condition</category><category domain="categories">Static code analysis</category><category domain="categories">Application Security</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Confession Booth</title>
        <link>https://arbaazjamadar.com/wiz/wiz-confession-booth/</link>
        <pubDate>Sat, 21 Mar 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/wiz-confession-booth/</guid>

        <description>Exploiting Race condition to gain access to the web app as admin</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Cloud Security</category><category domain="tags">Misconfigurations</category><category domain="tags">security CTF writeup</category><category domain="tags">Wiz</category><category domain="tags">Confession Booth</category><category domain="tags">go</category><category domain="tags">race conditions</category><category domain="tags">confessions</category><category domain="tags">wiz</category><category domain="tags">claude</category><category domain="tags">AI assisted</category><category domain="tags">WIZ</category><category domain="tags">WiZ</category><category domain="tags">Wiz: Confession Booth</category><category domain="tags">Wiz: Confession</category><category domain="tags">Code analysis</category><category domain="tags">Application Security</category><category domain="tags">reversing</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Network Security</category><category domain="categories">Web Security</category><category domain="categories">Race condition</category><category domain="categories">Static code analysis</category><category domain="categories">Application Security</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Game of Pods</title>
        <link>https://arbaazjamadar.com/wiz/game-of-pods/</link>
        <pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/game-of-pods/</guid>

        <description>Moving laterally and abusing secret creation for creating a secret of type service account token to get privileged users token. Then abuse the proxy and status to proxy the requests to authenticate with the kube-apiserver itself for getting cluster admin role and leaking secrets and all the information.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Kubernetes security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: Game of Pods</category><category domain="tags">Game of Pods</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Kubernetes</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="tags">CVE-2022-3294</category><category domain="tags">nodes/proxy</category><category domain="tags">nodes/status</category><category domain="tags">Lateral movement</category><category domain="tags">abusing secrets</category><category domain="tags">abusing service account tokens</category><category domain="tags">k8s-debug-bridge</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Kubernetes</category><category domain="categories">Cluster Hardening</category><category domain="categories">Kubernetes Privilege Escalation</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: State Of Affairs</title>
        <link>https://arbaazjamadar.com/wiz/state-of-affairs/</link>
        <pubDate>Sun, 11 Jan 2026 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/state-of-affairs/</guid>

        <description>Exploiting race condition to get sensitive information using terraform statefile-rce vulnerability.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">IaC security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: State of Affairs</category><category domain="tags">State of Affairs</category><category domain="tags">Wiz Cloud security Championship</category><category domain="tags">Security Engineer</category><category domain="tags">Cloud Security</category><category domain="tags">Hacktricks</category><category domain="tags">Exploitation</category><category domain="tags">Privilege Escalation</category><category domain="tags">Terraform</category><category domain="tags">Bash Scripting</category><category domain="tags">Locating Public Exploits</category><category domain="tags">Fixing Public Exploits</category><category domain="tags">Information Gathering</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Supply Chain Attack</category><category domain="categories">Terraform</category><category domain="categories">Terraform Privilege Escalation</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Needle In A Haystack</title>
        <link>https://arbaazjamadar.com/wiz/wiz-needle-in-a-haystack/</link>
        <pubDate>Sun, 28 Sep 2025 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/wiz-needle-in-a-haystack/</guid>

        <description>Using OSINT tools to deep dive into enumeration and exploiting misconfigured services to gain access to restricited endpoints.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Vibe coding vulnerabilities</category><category domain="tags">Vibe coding</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Insecure api usage</category><category domain="tags">API security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">WIZ: Needle in a haystack</category><category domain="tags">Needle in a haystack</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">API</category><category domain="categories">API Security</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Breaking The Barriers</title>
        <link>https://arbaazjamadar.com/wiz/azure-graph-api-oauth-abuse-guest-privilege-escalation/</link>
        <pubDate>Tue, 02 Sep 2025 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/azure-graph-api-oauth-abuse-guest-privilege-escalation/</guid>

        <description>Step-by-step attack chain abusing Azure Graph API with OAuth client credentials, dynamic group rules, and guest invitations to exfiltrate blob storage data. Includes defensive gaps, mitigations, and security best practices.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Azure Graph API exploitation</category><category domain="tags">Azure</category><category domain="tags">Entra ID</category><category domain="tags">Monitoring</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Networking</category><category domain="tags">OAuth client credentials abuse</category><category domain="tags">Azure guest access</category><category domain="tags">Graph API</category><category domain="tags">dynamic group privilege escalation</category><category domain="tags">Azure blob storage exfiltration</category><category domain="tags">Entra ID admin consent abuse</category><category domain="tags">Azure security CTF writeup</category><category domain="tags">WIZ</category><category domain="tags">Breaking The Barriers</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Containers</category><category domain="categories">DevSecOps</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Contain Me If You Can</title>
        <link>https://arbaazjamadar.com/wiz/container-escape-ctf-tcpdump-postgresql-core-pattern/</link>
        <pubDate>Wed, 27 Aug 2025 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/container-escape-ctf-tcpdump-postgresql-core-pattern/</guid>

        <description>End-to-end CTF write-up: sniff PostgreSQL creds with tcpdump, gain RCE via COPY FROM PROGRAM, escalate with sudo, and break out to host using /proc/sys/kernel/core_pattern. Includes detection &amp; mitigations.</description><category domain="tags">CTF</category><category domain="tags">CTF Writeup</category><category domain="tags">Docker</category><category domain="tags">Container Escape</category><category domain="tags">Container Hardening</category><category domain="tags">Kubernetes</category><category domain="tags">CloudSecurity</category><category domain="tags">Misconfigurations</category><category domain="tags">Networking</category><category domain="tags">microservices</category><category domain="tags">Horizontal Privilege Escalation</category><category domain="tags">PostgreSQL</category><category domain="tags">RCE</category><category domain="tags">tcpdump</category><category domain="tags">COPY FROM PROGRAM</category><category domain="tags">system mount vulnerabilities</category><category domain="tags">core_pattern exploit</category><category domain="tags">uevent_helper</category><category domain="tags">WIZ</category><category domain="tags">Contain me if you can</category><category domain="categories">CTF Writeups</category><category domain="categories">Cloud Security</category><category domain="categories">Containers</category><category domain="categories">DevSecOps</category></item><item>
        <title>Wiz The Ultimate Cloud Security Championship: Perimeter Leak</title>
        <link>https://arbaazjamadar.com/wiz/perimeterleak/</link>
        <pubDate>Tue, 26 Aug 2025 00:00:00 +0000</pubDate>
        <author>reachout@arbaazjamadar.com (Arbaaz Jamadar)</author>
        <guid isPermaLink="true">https://arbaazjamadar.com/wiz/perimeterleak/</guid>

        <description>Cloud Security CTF Writeup: Exploiting AWS IMDSv2, SSRF, and Spring Boot Actuator misconfigurations to access restricted S3 buckets.</description><category domain="tags">AWS</category><category domain="tags">Cloud Security</category><category domain="tags">CTF Writeup</category><category domain="tags">S3</category><category domain="tags">SSRF</category><category domain="tags">IMDSv2</category><category domain="tags">Spring Boot Actuator</category><category domain="tags">Misconfigurations</category><category domain="tags">IAM Roles</category><category domain="tags">Reverse-Proxy</category><category domain="tags">Least Privilege</category><category domain="tags">VPC Endpoint</category><category domain="tags">DevSecOps</category><category domain="tags">Cloud Misconfiguration</category><category domain="tags">WIZ</category><category domain="tags">Observability</category><category domain="tags">CTF</category><category domain="tags">WIZ Perimeter Leak</category></item>
  </channel>
</rss>
