"participants to think holistically, starting with discovery and reconnaissance, progressing through exploitation and privilege escalation, and ultimately pursuing meaningful post - exploitation outcomes. web application exploitation many challenges focused on classic web attack v…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1525Implant Internal Image
73%
"an approach central to professional offensive security engagements. ekoparty red team space 2025 : cloud - native offensive campaigns at ekoparty red team space 2025, bishop fox researchers luis de la rosa, jose emiliano perez garduno, jose martinez, and steeven rodriguez compete…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1525Implant Internal Image
38%
"permissive s3 buckets, ec2 instance roles, and lambda functions used for lateral movement or data retrieval. credential chaining temporary credentials and tokens also played a major role. participants extracted short - lived security tokens, mapped trust relationships across serv…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078.004Cloud Accounts
32%
"an approach central to professional offensive security engagements. ekoparty red team space 2025 : cloud - native offensive campaigns at ekoparty red team space 2025, bishop fox researchers luis de la rosa, jose emiliano perez garduno, jose martinez, and steeven rodriguez compete…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
CTF competitions push offensive security skills to their limits. In 2025, the Bishop Fox Mexico team claimed first place at both HackMex Finals and EkoParty Red Team Space. Discover how the team navigated web exploitation, infrastructure compromise, and AWS attack paths to win.