Month 5 opens on ILIAS, a fast-growing AI scale-up with a dangerously misconfigured cloud. What starts as a stray credential in a verbose production log spirals into full organizational takeover. You'll exploit VM metadata services, abuse IAM roles, drain key vaults and escalate to subscription Owner. Two paths, two endings, one question: how far do you go?
Then the floor drops. Apex Meridian's cryptographic service Whisper CORE exposes no obvious attack surface. No injection points. No leaked tokens. Just behavior. You'll learn to listen. Timing-based side-channel analysis. Error oracle attacks. Padding oracle attacks, byte by byte, until a full block yields its secret. Statistical decryption of bearer tokens. You'll reconstruct an internal API catalog from scraps of service responses and uncover hidden data relationships across data lakes.
Month 5 is where instinct replaces checklists. You stop looking for the obvious flaw. You start reading the system.