<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Blogs on security ?!</title><link>https://adicpnn.com/blog/</link><description>Recent content in Blogs on security ?!</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 18 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://adicpnn.com/blog/index.xml" rel="self" type="application/rss+xml"/><item><title>Cloudfoxable - Middle</title><link>https://adicpnn.com/blog/cloudfoxable/middle/</link><pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/middle/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;Here we have another case of blurred lines. A vulnerability that anyone in the world can exploit, except not really. To successfully exploit it, you need to know some key information, which makes it fall in the &amp;ldquo;Assumed breach: Malicious/Compromised user&amp;rdquo; category as well.&lt;/p&gt;
&lt;p&gt;So really the refined statement is: &amp;ldquo;Anyone in the world can exploit this provided they at some point had/have internal knowledge of the environment&amp;rdquo;. This means someone who used to work at Cloudfoxable Corp could exploit this, or even someone who currently works there but wants to keep their actions anonymous.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Trust me</title><link>https://adicpnn.com/blog/cloudfoxable/trust-me/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/trust-me/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;There&amp;rsquo;s a role that trusts the repo you just created. Find the role and exploit the trust to access the flag.&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;I&amp;rsquo;ll start off by enumerating AWS roles in my sandbox account, hoping to see a trust policy for the repo i&amp;rsquo;ve created &lt;code&gt;adicpnn/cfx_trust_me&lt;/code&gt;.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;span class="lnt"&gt;11
&lt;/span&gt;&lt;span class="lnt"&gt;12
&lt;/span&gt;&lt;span class="lnt"&gt;13
&lt;/span&gt;&lt;span class="lnt"&gt;14
&lt;/span&gt;&lt;span class="lnt"&gt;15
&lt;/span&gt;&lt;span class="lnt"&gt;16
&lt;/span&gt;&lt;span class="lnt"&gt;17
&lt;/span&gt;&lt;span class="lnt"&gt;18
&lt;/span&gt;&lt;span class="lnt"&gt;19
&lt;/span&gt;&lt;span class="lnt"&gt;20
&lt;/span&gt;&lt;span class="lnt"&gt;21
&lt;/span&gt;&lt;span class="lnt"&gt;22
&lt;/span&gt;&lt;span class="lnt"&gt;23
&lt;/span&gt;&lt;span class="lnt"&gt;24
&lt;/span&gt;&lt;span class="lnt"&gt;25
&lt;/span&gt;&lt;span class="lnt"&gt;26
&lt;/span&gt;&lt;span class="lnt"&gt;27
&lt;/span&gt;&lt;span class="lnt"&gt;28
&lt;/span&gt;&lt;span class="lnt"&gt;29
&lt;/span&gt;&lt;span class="lnt"&gt;30
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory aws % aws iam list-roles --profile cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Path&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;/&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;RoleName&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;t_rodman&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;RoleId&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;AROAR4HCPRIDWZYYOATJQ&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Arn&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:iam::129323993607:role/t_rodman&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;CreateDate&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;2026-03-17T15:21:22+00:00&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;AssumeRolePolicyDocument&amp;#34;&lt;/span&gt;: &lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Version&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;2012-10-17&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Statement&amp;#34;&lt;/span&gt;: &lt;span class="o"&gt;[&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Sid&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Effect&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;Allow&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Principal&amp;#34;&lt;/span&gt;: &lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Federated&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:iam::129323993607:oidc-provider/token.actions.githubusercontent.com&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Action&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;sts:AssumeRoleWithWebIdentity&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Condition&amp;#34;&lt;/span&gt;: &lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;StringLike&amp;#34;&lt;/span&gt;: &lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;token.actions.githubusercontent.com:sub&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;repo:adicpnn/cfx_trust_me:*&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;token.actions.githubusercontent.com:aud&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;sts.amazonaws.com&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;MaxSessionDuration&amp;#34;&lt;/span&gt;: &lt;span class="m"&gt;3600&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;What this trust policy statement allows, is for GitHub Actions to assume the role &lt;code&gt;t_rodman&lt;/code&gt; using OpenID Connect. I&amp;rsquo;ll keep this information and mind, and keep unraveling the exploit chain.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Backwards</title><link>https://adicpnn.com/blog/cloudfoxable/backwards/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/backwards/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;In some challenges, you might not see an IAM role or an IP address as the starting point, but rather, an interesting ARN or something like that.&lt;/p&gt;
&lt;p&gt;Sometimes during cloud penetration tests, we first find something interesting and then work backwards to see who has access to it. Is it just the Administrators? Well, that&amp;rsquo;s not really a big deal. Is it all developers, or all users, or anyone in the world? That might be a really big deal!&lt;/p&gt;</description></item><item><title>Cloudfoxable - Furls1</title><link>https://adicpnn.com/blog/cloudfoxable/furls1/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/furls1/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;A Lambda function URL can be used to expose a Lambda function to the internet without an API gateway or another load balancer. This is really handy for builders, but can also be really handy for offensive security folk, as it&amp;rsquo;s ripe for misconfiguration.&lt;/p&gt;
&lt;p&gt;Use cloudfox to find the furls1 FunctionURL and find the flag.&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;I&amp;rsquo;ll start off by enumerating the lambda functions in this account.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Furls2</title><link>https://adicpnn.com/blog/cloudfoxable/furls2/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/furls2/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;This Lambda Function URL doesn&amp;rsquo;t just give you the key like furls1. You have to work a little harder for this one. CloudFox can definitely help you here.&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;This time around, I don&amp;rsquo;t know which lambda function to target, since there&amp;rsquo;s no &amp;ldquo;furls2&amp;rdquo; function. Instead, I will list all the function URLs in the AWS account. (minus the one I&amp;rsquo;ve already exploited)&lt;/p&gt;</description></item><item><title>Cloudfoxable - Needles</title><link>https://adicpnn.com/blog/cloudfoxable/needles/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/needles/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;You&amp;rsquo;ve just gained access to the role ramos. This role has a bunch of read only access? Can you comb through the access you have and the resources that exist and see if you can find the flag?&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;Short and concise challenge details, I will start by preparing a profile for ramos, and checking which policies are attached to it.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Pain</title><link>https://adicpnn.com/blog/cloudfoxable/pain/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/pain/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;In the 2022 FIFA World Cup, Christian Pulisic put his body on the line to net a crucial goal for the USA, ensuring their progression beyond the group stage: &lt;a href="https://www.youtube.com/watch?v=Y7VA30UYlQo"&gt;https://www.youtube.com/watch?v=Y7VA30UYlQo&lt;/a&gt;. He did what he had to do, even though he knew it was going to hurt.&lt;/p&gt;
&lt;p&gt;Similarly, during a penetration test, whether in a cloud environment or otherwise, you might identify a exploit path that won&amp;rsquo;t be pleasant to exploit, but you know the end result will be worth it.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Root</title><link>https://adicpnn.com/blog/cloudfoxable/root/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/root/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;You&amp;rsquo;ve just gained access to the role Kent. Can you get to the root flag in the SSM parameter store?&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;Short and concise challenge details, I will start by preparing a profile for ramos, and checking which policies are attached to it.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;span class="lnt"&gt;11
&lt;/span&gt;&lt;span class="lnt"&gt;12
&lt;/span&gt;&lt;span class="lnt"&gt;13
&lt;/span&gt;&lt;span class="lnt"&gt;14
&lt;/span&gt;&lt;span class="lnt"&gt;15
&lt;/span&gt;&lt;span class="lnt"&gt;16
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % cat ~/.aws/config&lt;span class="p"&gt;|&lt;/span&gt; tail
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;[&lt;/span&gt;profile kent&lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;region&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; eu-central-1
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;role_arn&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; arn:aws:iam::129323993607:role/Kent
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;source_profile&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % aws iam list-attached-role-policies --role-name Kent --profile cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;AttachedPolicies&amp;#34;&lt;/span&gt;: &lt;span class="o"&gt;[&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;PolicyName&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;root-policy1&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;PolicyArn&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:iam::129323993607:policy/root-policy1&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;A single policy attached, let&amp;rsquo;s see what type of access it grants.&lt;/p&gt;</description></item><item><title>Cloudfoxable - Segue</title><link>https://adicpnn.com/blog/cloudfoxable/segue/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/segue/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;You&amp;rsquo;ve just gained access to the reinier role. Utilize cloudfox and see where it takes you!&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;First things first, set up the profile, and test access.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;span class="lnt"&gt;11
&lt;/span&gt;&lt;span class="lnt"&gt;12
&lt;/span&gt;&lt;span class="lnt"&gt;13
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % cat ~/.aws/config &lt;span class="p"&gt;|&lt;/span&gt; tail
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;[&lt;/span&gt;profile reinier&lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;region&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; eu-central-1
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;role_arn&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; arn:aws:iam::129323993607:role/reinier
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;source_profile&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % aws sts get-caller-identity --profile reinier
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;UserId&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;AROAR4HCPRIDTDEJTABUR:botocore-session-1773311810&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Account&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;129323993607&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Arn&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:sts::129323993607:assumed-role/reinier/botocore-session-1773311810&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Then, enumerating attached policies.&lt;/p&gt;</description></item><item><title>Cloudfoxable - The topic is execution</title><link>https://adicpnn.com/blog/cloudfoxable/execution/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/execution/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;You&amp;rsquo;ve just gained access to the role viniciusjr. At first glance, this role appears to only have some SNS read-only access? But I don&amp;rsquo;t think that&amp;rsquo;s accurate. See if you can get to the flag /cloudfoxable/flag/executioner in the SSM parameter store.&lt;/p&gt;
&lt;!-- raw HTML omitted --&gt;
&lt;h3 id="information-gathering"&gt;Information Gathering&lt;/h3&gt;
&lt;p&gt;First things first, set up the profile, and test access.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;div class="chroma"&gt;
&lt;table class="lntable"&gt;&lt;tr&gt;&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code&gt;&lt;span class="lnt"&gt; 1
&lt;/span&gt;&lt;span class="lnt"&gt; 2
&lt;/span&gt;&lt;span class="lnt"&gt; 3
&lt;/span&gt;&lt;span class="lnt"&gt; 4
&lt;/span&gt;&lt;span class="lnt"&gt; 5
&lt;/span&gt;&lt;span class="lnt"&gt; 6
&lt;/span&gt;&lt;span class="lnt"&gt; 7
&lt;/span&gt;&lt;span class="lnt"&gt; 8
&lt;/span&gt;&lt;span class="lnt"&gt; 9
&lt;/span&gt;&lt;span class="lnt"&gt;10
&lt;/span&gt;&lt;span class="lnt"&gt;11
&lt;/span&gt;&lt;span class="lnt"&gt;12
&lt;/span&gt;&lt;span class="lnt"&gt;13
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;
&lt;td class="lntd"&gt;
&lt;pre tabindex="0" class="chroma"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % cat ~/.aws/config &lt;span class="p"&gt;|&lt;/span&gt; tail
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;[&lt;/span&gt;profile vini&lt;span class="o"&gt;]&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;region&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; eu-central-1
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;role_arn&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; arn:aws:iam::129323993607:role/viniciusjr
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="nv"&gt;source_profile&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; cloudfoxable
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;adicpnn@laboratory cloud % aws sts get-caller-identity --profile vini
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;UserId&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;AROAR4HCPRIDXMLFGL22G:botocore-session-1773327029&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Account&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;129323993607&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt; &lt;span class="s2"&gt;&amp;#34;Arn&amp;#34;&lt;/span&gt;: &lt;span class="s2"&gt;&amp;#34;arn:aws:sts::129323993607:assumed-role/viniciusjr/botocore-session-1773327029&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class="line"&gt;&lt;span class="cl"&gt;&lt;span class="o"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;p&gt;Then, enumerating attached policies.&lt;/p&gt;</description></item><item><title>Cloudfoxable - The topic is exposure</title><link>https://adicpnn.com/blog/cloudfoxable/exposure/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/exposure/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;What does it mean when we say something is &amp;ldquo;public&amp;rdquo; in the cloud? Do you need an IP address to be public? What if a resource is accessible to anyone in the world, provided they have an AWS account (any AWS account). That seems close enough to public to scare me!&lt;/p&gt;
&lt;p&gt;Note: FWIW, there is a policy on the resource in question that will only allow you to exploit it from your IP address to prevent misuse)&lt;/p&gt;</description></item><item><title>Cloudfoxable - It's another secret</title><link>https://adicpnn.com/blog/cloudfoxable/its-another-secret/</link><pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/its-another-secret/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;TL;DR: You&amp;rsquo;ve just gained access to the role Ertz. Can you find and access the its-another-secret flag?&lt;/p&gt;
&lt;p&gt;A lot of the challenges in the category Assumed Breach: Principal will have you assume into a role to simulate a new starting point. You&amp;rsquo;ll technically start as ctf-starting-user, but your first action will be to assume the role Ertz listed above. This is to simulate a scenario where you&amp;rsquo;ve just gained access to the role Ertz.&lt;/p&gt;</description></item><item><title>Cloudfoxable - It's a secret</title><link>https://adicpnn.com/blog/cloudfoxable/its-a-secret/</link><pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/its-a-secret/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;For this CTF, your starting CTF user has the following policies:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SecurityAudit (AWS Managed)
CloudFox (Customer Managed)
its-a-secret (Customer Managed)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The first two policies allow you to run CloudFox. The third policy allows this starting user to get the flag for this challenge. If you followed the setup steps in the First Flag challenge (if you are doing this in a workshop, the setup in First Flag has been done for you), you&amp;rsquo;ll have a profile called cloudfoxable which is tied to the &lt;code&gt;user/ctf-starting-user&lt;/code&gt;.&lt;/p&gt;</description></item></channel></rss>