<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>📁 Wiz x Cloud Security Championship on Jack Warner</title>
    <link>https://www.jackywarner.com/blog/cloud/wiz---wiz-x-cloud-security-championship/</link>
    <description>Recent content in 📁 Wiz x Cloud Security Championship on Jack Warner</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>21jackwarner@gmail.com (Jack Warner)</managingEditor>
    <webMaster>21jackwarner@gmail.com (Jack Warner)</webMaster>
    <copyright>© 2026 Jack Warner</copyright>
    <lastBuildDate>Mon, 23 Mar 2026 13:55:03 -0400</lastBuildDate><atom:link href="https://www.jackywarner.com/blog/cloud/wiz---wiz-x-cloud-security-championship/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Wiz x Cloud Security Championship: Perimeter Leak</title>
      <link>https://www.jackywarner.com/blog/cloud/wiz---wiz-x-cloud-security-championship/wiz-x-cloud-security-championship/wiz-x-cloud-security-championship---perimeter-leak/</link>
      <pubDate>Mon, 07 Jul 2025 00:00:00 +0000</pubDate>
      <author>21jackwarner@gmail.com (Jack Warner)</author>
      <guid>https://www.jackywarner.com/blog/cloud/wiz---wiz-x-cloud-security-championship/wiz-x-cloud-security-championship/wiz-x-cloud-security-championship---perimeter-leak/</guid>
      <description>Wiz has launched a new series of monthly expert-level cloud security CTF challenges, each designed by a specialist in a specific area of cloud security. These aren’t your typical beginner warmups—each challenge dives deep into real-world concepts and techniques used by professionals. The first challenge, titled Perimeter Leak, was created by AWS security expert Scott Piper. It drops players into a simulated environment where they’ve already compromised a server and now face a final obstacle: exfiltrating a flag from an S3 bucket protected by an AWS data perimeter.Solving this challenge requires a strong understanding of advanced AWS features, particularly those around IAM, VPC endpoints, data perimeters, and possibly unintended misconfigurations that can be exploited. Like Wiz’s earlier CTFs, the environment comes fully loaded and self-contained, with optional hints (at a cost to your score). It&amp;rsquo;s a great opportunity to practice and learn how seasoned researchers think when attacking cloud setups.</description>
      
    </item>
    
  </channel>
</rss>
