<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Secrets on security ?!</title><link>https://adicpnn.com/tags/secrets/</link><description>Recent content in Secrets on security ?!</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 12 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://adicpnn.com/tags/secrets/index.xml" rel="self" type="application/rss+xml"/><item><title>Cloudfoxable - Backwards</title><link>https://adicpnn.com/blog/cloudfoxable/backwards/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/backwards/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;In some challenges, you might not see an IAM role or an IP address as the starting point, but rather, an interesting ARN or something like that.&lt;/p&gt;
&lt;p&gt;Sometimes during cloud penetration tests, we first find something interesting and then work backwards to see who has access to it. Is it just the Administrators? Well, that&amp;rsquo;s not really a big deal. Is it all developers, or all users, or anyone in the world? That might be a really big deal!&lt;/p&gt;</description></item><item><title>Cloudfoxable - It's another secret</title><link>https://adicpnn.com/blog/cloudfoxable/its-another-secret/</link><pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/its-another-secret/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;TL;DR: You&amp;rsquo;ve just gained access to the role Ertz. Can you find and access the its-another-secret flag?&lt;/p&gt;
&lt;p&gt;A lot of the challenges in the category Assumed Breach: Principal will have you assume into a role to simulate a new starting point. You&amp;rsquo;ll technically start as ctf-starting-user, but your first action will be to assume the role Ertz listed above. This is to simulate a scenario where you&amp;rsquo;ve just gained access to the role Ertz.&lt;/p&gt;</description></item><item><title>Cloudfoxable - It's a secret</title><link>https://adicpnn.com/blog/cloudfoxable/its-a-secret/</link><pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate><guid>https://adicpnn.com/blog/cloudfoxable/its-a-secret/</guid><description>&lt;!-- raw HTML omitted --&gt;
&lt;p&gt;For this CTF, your starting CTF user has the following policies:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;SecurityAudit (AWS Managed)
CloudFox (Customer Managed)
its-a-secret (Customer Managed)
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The first two policies allow you to run CloudFox. The third policy allows this starting user to get the flag for this challenge. If you followed the setup steps in the First Flag challenge (if you are doing this in a workshop, the setup in First Flag has been done for you), you&amp;rsquo;ll have a profile called cloudfoxable which is tied to the &lt;code&gt;user/ctf-starting-user&lt;/code&gt;.&lt;/p&gt;</description></item></channel></rss>