Cloud / DevOps
Cloud challenges cover misconfigurations and vulnerabilities in AWS, Azure, GCP, Docker, and Kubernetes — from exposed S3 buckets and leaked credentials to container escapes and IAM privilege escalation.
Cloud / DevOps security focuses on vulnerabilities specific to modern infrastructure: cloud platforms (AWS, Azure, GCP), container orchestration (Kubernetes, Docker), Infrastructure-as-Code (Terraform, CloudFormation), and CI/CD pipelines.
Unlike traditional security, the attack surface here is largely configuration-driven. A single IAM policy with excessive permissions or a publicly accessible S3 bucket can expose an entire organisation's data without any code vulnerability involved.
In a CTF, cloud challenges give you credentials, a running cloud environment, a Docker image, or a Kubernetes config and ask you to escalate privileges, read a protected secret, or escape a container to reach the flag.
Common workflow: enumerate accessible resources (S3, EC2, IAM policies) → query the metadata service (169.254.169.254) → find misconfigured permissions → escalate → read the flag from a secrets manager or root volume.
Sample Challenge
startup-assets.s3.amazonaws.com.
The security team suspects the S3 bucket has a misconfigured ACL. Investigate and retrieve the flag.- List the bucket without credentials:
aws s3 ls s3://startup-assets --no-sign-request— it succeeds, confirming public-read ACL. - Browse the listing — spot an interesting file:
internal/config_backup.json. - Download it:
aws s3 cp s3://startup-assets/internal/config_backup.json . --no-sign-request. - Open the JSON — it contains an
aws_secret_access_keyand aflagfield. - Read the
flagvalue directly from the file.