Skip to content

Wiz: The Ultimate Cloud Security Championship

Arbaaz Jamadar
Written by
Arbaaz Jamadar
Cloud Security Engineer | OSCP | AWS Security Specialty | CySA+ | Threat Detection & Incident Response
Feel free to reachout on LinkedIn or any of my socials in case you need help with the challenge.
Wiz The Ultimate Cloud Security Championship: Happy Birthday
Wiz The Ultimate Cloud Security Championship: Happy Birthday
Loose resource policies enable the attacker to perform unauthenticated data exfiltration from S3 bucket. The attacker is able to collect and develop all the resource arn’s via publicly available endpoints.
Wiz The Ultimate Cloud Security Championship: Trust Issues
Wiz The Ultimate Cloud Security Championship: Trust Issues
Exploiting Race condition to gain access to the web app as admin
Wiz The Ultimate Cloud Security Championship: Confession Booth
Wiz The Ultimate Cloud Security Championship: Confession Booth
Exploiting Race condition to gain access to the web app as admin
Wiz The Ultimate Cloud Security Championship: Game of Pods
Wiz The Ultimate Cloud Security Championship: Game of Pods
Moving laterally and abusing secret creation for creating a secret of type service account token to get privileged users token. Then abuse the proxy and status to proxy the requests to authenticate with the kube-apiserver itself for getting cluster admin role and leaking secrets and all the information.
Wiz The Ultimate Cloud Security Championship: State Of Affairs
Wiz The Ultimate Cloud Security Championship: State Of Affairs
Exploiting race condition to get sensitive information using terraform statefile-rce vulnerability.
Wiz The Ultimate Cloud Security Championship: Needle In A Haystack
Wiz The Ultimate Cloud Security Championship: Needle In A Haystack
Using OSINT tools to deep dive into enumeration and exploiting misconfigured services to gain access to restricited endpoints.
Wiz The Ultimate Cloud Security Championship: Breaking The Barriers
Wiz The Ultimate Cloud Security Championship: Breaking The Barriers
Step-by-step attack chain abusing Azure Graph API with OAuth client credentials, dynamic group rules, and guest invitations to exfiltrate blob storage data. Includes defensive gaps, mitigations, and security best practices.
Wiz The Ultimate Cloud Security Championship: Contain Me If You Can
Wiz The Ultimate Cloud Security Championship: Contain Me If You Can
End-to-end CTF write-up: sniff PostgreSQL creds with tcpdump, gain RCE via COPY FROM PROGRAM, escalate with sudo, and break out to host using /proc/sys/kernel/core_pattern. Includes detection & mitigations.
Wiz The Ultimate Cloud Security Championship: Perimeter Leak
Wiz The Ultimate Cloud Security Championship: Perimeter Leak
Cloud Security CTF Writeup: Exploiting AWS IMDSv2, SSRF, and Spring Boot Actuator misconfigurations to access restricted S3 buckets.