Kévin Tellier (@k3vintell) 's Twitter Profile
Kévin Tellier

@k3vintell

🥷@Synacktiv
Moved to : bsky.app/profile/kevint…

ID: 1470465850297798657

calendar_today13-12-2021 18:50:10

63 Tweet

88 Followers

160 Following

Synacktiv (@synacktiv) 's Twitter Profile Photo

Just wrapped up two fantastic training sessions at #Hexacon! A big thank you to everyone who joined us for our deep dives into Active Directory/Azure and iOS internals. It was great to share knowledge and learn together!

Just wrapped up two fantastic training sessions at #Hexacon! A big thank you to everyone who joined us for our deep dives into Active Directory/Azure and iOS internals. It was great to share knowledge and learn together!
TrustedSec (@trustedsec) 's Twitter Profile Photo

During a recent engagement, Justin Bollinger discovered how an attacker can craft a CSR by using default system certificates. After finding out this method was novel, the team kept digging. Read what they found in our new #blog! hubs.la/Q02SCqpG0

Andrea Pierini (@decoder_it) 's Twitter Profile Photo

Administrator Protection, introduced in the latest Windows Insider Canary build, is a solid security enhancement... uhh.. really?? can be bypassed with Antonio Cocomazzi's clever SspiUacBypass tool. Check it out here: github.com/antonioCoco/Ss…

Administrator Protection, introduced in the latest Windows Insider Canary build, is a solid security enhancement... uhh.. really??  can be bypassed with <a href="/splinter_code/">Antonio Cocomazzi</a>'s clever SspiUacBypass tool. Check it out here: github.com/antonioCoco/Ss…
CICADA8Research (@cicada8research) 's Twitter Profile Photo

Hi! We'd like to share our new research with you. You've probably heard about COM Hijacking, but we've found another way of persistence via COM. Typelib! Read the article here: medium.com/@cicada-8/hija…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Octoscan, our GitHub actions vulnerability scanner, is now available as a GitHub action! It will find vulnerabilities in new commits and pull requests, and upload it to GitHub as it now supports the SARIF file format! github.com/synacktiv/acti…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Oh, you didn't know? Cool kids are now relaying Kerberos over SMB 😏 Check out our latest blogpost by Hugow to discover how to perform this attack: synacktiv.com/publications/r…

drm (@lowercase_drm) 's Twitter Profile Photo

Coffee break thoughts: "is it possible to bruteforce RPC endpoint to perform code exec if you can't access EPM/SMB?" 99% impacket atexec + 1% "for loop" = 100% prod ready gist.github.com/ThePirateWhoSm… (silent command only) h/t SAERXCIT 🌻

Coffee break thoughts: "is it possible to bruteforce RPC endpoint to perform code exec if you can't access EPM/SMB?"

99% impacket atexec + 1% "for loop" = 100% prod ready
gist.github.com/ThePirateWhoSm… (silent command only)
h/t <a href="/saerxcit/">SAERXCIT</a> 
🌻
Eliran Nissan (@eliran_nissan) 's Twitter Profile Photo

I am excited to share with you my latest research - "DCOM Upload & Execute" An advanced lateral movement technique to upload and execute custom payloads on remote targets Forget about PSEXEC and dive in! deepinstinct.com/blog/forget-ps… github.com/deepinstinct/D…

Synacktiv (@synacktiv) 's Twitter Profile Photo

You can now relay any protocol to SMB over Kerberos with krbrelayx.py and the latest PRs from Hugow. Thanks Dirk-jan for merging it! Here is an example from SMB to SMB:

You can now relay any protocol to SMB over Kerberos with krbrelayx.py and the latest PRs from <a href="/hugow_vincent/">Hugow</a>.
Thanks <a href="/_dirkjan/">Dirk-jan</a> for merging it!
Here is an example from SMB to SMB:
Synacktiv (@synacktiv) 's Twitter Profile Photo

You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from Pierre Milioni (now merged upstream). Here is an example with ldeep using relayed authentication from HTTP to LDAPs :

You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from <a href="/b1two_/">Pierre Milioni</a> (now merged upstream).
Here is an example with ldeep using relayed authentication from HTTP to LDAPs :
Synacktiv (@synacktiv) 's Twitter Profile Photo

For the second year in a row, we managed to get first place at the #HackTheBox Business #CTF 2025! 🥇 Congratulations to GMOサイバーセキュリティ byイエラエ株式会社【公式】 and Downscope and thanks to Hack The Box for the fun challenges! 🥳

For the second year in a row, we managed to get first place at the #HackTheBox Business #CTF 2025! 🥇 Congratulations to <a href="/gmo_ierae/">GMOサイバーセキュリティ byイエラエ株式会社【公式】</a> and Downscope and thanks to <a href="/hackthebox_eu/">Hack The Box</a> for the fun challenges! 🥳
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

To those who set the bar 🥂 Global Cyber Skills Benchmark 2025 is over, and the leaderboard has spoken. Huge congrats to the top corporate #cybersecurity teams who crushed it in this global competition: 🥇 Synacktiv 🥈 GMOセキュリティ24 |Webサイトリスク・パスワード漏洩診断 | セキュリティAI相談 🥉 downscope.org #HackTheBox

To those who set the bar 🥂
Global Cyber Skills Benchmark 2025 is over, and the leaderboard has spoken. Huge congrats to the top corporate #cybersecurity teams who crushed it in this global competition:
🥇 <a href="/Synacktiv/">Synacktiv</a> 
🥈 <a href="/GMOsecurity24/">GMOセキュリティ24 |Webサイトリスク・パスワード漏洩診断 | セキュリティAI相談</a> 
🥉 downscope.org

#HackTheBox
Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…

Wil (@wil_fri3d) 's Twitter Profile Photo

Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !

Clubic (@clubic) 's Twitter Profile Photo

🚨 Les experts français de Synacktiv transforment le Thermomix en démonstration de hacking :) Manipulation de température, messages personnalisés... tout est possible ! On vous raconte ça 👉 clubic.com/actualite-5728… #thermomix

🚨 Les experts français de <a href="/Synacktiv/">Synacktiv</a> transforment le Thermomix en démonstration de hacking :)

Manipulation de température, messages personnalisés... tout est possible !

On vous raconte ça 👉 clubic.com/actualite-5728… 

#thermomix
Synacktiv (@synacktiv) 's Twitter Profile Photo

🔥 A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO attacks in Active Directory. Proud of the team! 🙌 cc kalimero Quentin Roland Wil

🔥 A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO attacks in Active Directory. Proud of the team! 🙌 cc <a href="/kalimer0x00/">kalimero</a> <a href="/quent0x1/">Quentin Roland</a> <a href="/wil_fri3d/">Wil</a>
Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninjas are in Vienna for the T-REX conference! 🎤 Kévin Tellier delivered a session exploring advanced Red Team lateral movement techniques built on DCOM - a great opportunity to exchange practices with fellow experts. Thank you to the OeNB for hosting such a great event!

Our ninjas are in Vienna for the T-REX conference!

🎤 <a href="/k3vinTell/">Kévin Tellier</a> delivered a session exploring advanced Red Team lateral movement techniques built on DCOM - a great opportunity to exchange practices with fellow experts.

Thank you to the <a href="/oenb/">OeNB</a> for hosting such a great event!