t0 (@___t0___) 's Twitter Profile
t0

@___t0___

ID: 1005052071589105664

calendar_today08-06-2018 11:41:01

511 Tweet

230 Followers

179 Following

Synacktiv (@synacktiv) 's Twitter Profile Photo

Right before #Pwn2Own Ireland 2024, Baptiste M. found a vulnerability in Synology TC500 & BC500 security cameras. A blind format string exploit allowed code execution, but Synology patched it, securing the devices in time for the competition. synacktiv.com/publications/e…

Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

From 10 meters, they can control your bicycle's gears: Multiple attack vectors on Shimano bicycles have been published. Useful for competitions & deadly for safety🛑🚴💥 PDF: "MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles" usenix.org/system/files/w…

From 10 meters, they can control your bicycle's gears: Multiple attack vectors on Shimano bicycles have been published. Useful for competitions & deadly for safety🛑🚴💥

PDF: "MakeShift: Security Analysis of Shimano Di2 Wireless Gear Shifting in Bicycles"
usenix.org/system/files/w…
Synacktiv (@synacktiv) 's Twitter Profile Photo

Oh, you didn't know? Cool kids are now relaying Kerberos over SMB 😏 Check out our latest blogpost by Hugow to discover how to perform this attack: synacktiv.com/publications/r…

Maxwell ꓘ Dulin (Strikeout) (@dooflin5) 's Twitter Profile Photo

I taught a killer training of glibc malloc heap exploitation for several years. After some effort, the content is now open source and mostly ready to consume! Half of the videos are posted for the course. 🔥 github.com/SecurityInnova…

Synacktiv (@synacktiv) 's Twitter Profile Photo

A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by kalimero. synacktiv.com/advisories/mic…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Whew! It took two attempts but the Synacktiv team successfully exploited the #ChargePoint EV Charger and demonstrated signal manipulation over the connector. They are off to the disclosure room to go over how they did it. #P2OAuto #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We're doomed! At least the #Kenwood IVI is since Synacktiv exploited the system and loaded a video of the classic FPS. They're off to the disclosure room to provide details on the exploit and why Doom isn't playable. #P2OAuto #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Wow. Just wow. The @synacktiv team was able to take over the #Tesla Wall Connector while having their exploit originate from the Charging Connector. To our knowledge, that's never been demonstrated publicly before. They head to the disclosure room with details. #P2OAuto #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Not surprising anyone, Synacktiv succeeds again. This time, they exploited the Sony XAV-AX8500. They head off to the disclosure room (again) to tell us how they did it. #P2OAuto #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! The Synacktiv team used a single buffer overflow to exploit the Autel MaxiCharger. They were also able to demonstrate signals being transmitted via the Charging Connector for the add on. This work earns them $35,000 and 6 Master of Pwn points. #P2OAuto #Pwn2Own

Confirmed! The <a href="/Synacktiv/">Synacktiv</a> team used a single buffer overflow to exploit the Autel MaxiCharger. They were also able to demonstrate signals being transmitted via the Charging Connector for the add on. This work earns them $35,000 and 6 Master of Pwn points. #P2OAuto #Pwn2Own
Synacktiv (@synacktiv) 's Twitter Profile Photo

In our latest article, Quentin Roland proposes an implementation of a trick discovered by James Forshaw in his research. Discover how to perform pre-authenticated Kerberos relay over HTTP with our Responder and krbrelayx pull requests! synacktiv.com/publications/a…

Synacktiv (@synacktiv) 's Twitter Profile Photo

We've just updated our training catalog to include the latest additions, including a brand new course on ransomware investigations! Find all the dates and details at synacktiv.com/en/offers/trai…

We've just updated our training catalog to include the latest additions, including a brand new course on ransomware investigations!
Find all the dates and details at synacktiv.com/en/offers/trai…
Synacktiv (@synacktiv) 's Twitter Profile Photo

In our latest article, laxa revisits the secretsdump implementation, offering an alternative avoiding reg save and eliminates writing files to disk, significantly reducing the likelihood of triggering security alerts. Read the details at synacktiv.com/publications/l….

Synacktiv (@synacktiv) 's Twitter Profile Photo

In our latest article, Quentin Roland and Scaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav HTTP authentication, enhancing the NTLM and Kerberos relaying capabilities of multicast poisoning attacks! synacktiv.com/publications/t…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Interested in vulnerabilities in video games? 🎮 Tomtombinary presented critical flaws in Neverwinter Nights Enhanced Edition at #Hexacon, which could allow attackers to take control of players' computers. 🛡️ Check out the full details of these bugs!👇 synacktiv.com/en/publication…

Synacktiv (@synacktiv) 's Twitter Profile Photo

🚀 This week, Us3r777 & Pierre kick off our new Whitebox Vulnerability Research training! Students will dive into PHP, Java, and .NET, analyzing & exploiting 1-day vulnerabilities. Let’s get started! 💻🔍

🚀 This week, <a href="/us3r777/">Us3r777</a> &amp; <a href="/__pierreg/">Pierre</a> kick off our new Whitebox Vulnerability Research training! Students will dive into PHP, Java, and .NET, analyzing &amp; exploiting 1-day vulnerabilities. Let’s get started! 💻🔍