Pierre Milioni

75 posts

Pierre Milioni

Pierre Milioni

@b1two_

가입일 Kasım 2018
238 팔로잉280 팔로워
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
From legacy WEP to WPA3-Enterprise: sharing our recent #WiFi field experiences. 📡 We detail various scenarios to better understand the risks, including WPA3 PEAP relaying & optimized online PSK brute-forcing. ⤵️ synacktiv.com/en/publication…
English
0
30
63
6.7K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
🧑‍🎓 Boost your offensive Active Directory skills with our Entry & Advanced trainings. Hands-on labs with dozens of machines + latest research from DEFCON, x33fcon & more! Seats are limited, don’t miss out! 🔗 Entry: synacktiv.com/en/offers/trai… 🔗 Advanced: synacktiv.com/en/offers/trai…
Synacktiv tweet mediaSynacktiv tweet media
English
0
11
20
2.9K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: github.com/synacktiv/Grou… This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
English
1
99
239
17.7K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. synacktiv.com/publications/n…
English
5
259
598
209.4K
Pierre Milioni 리트윗함
/ˈziːf-kɒn/
/ˈziːf-kɒn/@x33fcon·
Got SCCM? You need to hear this! At #x33fcon, @kalimer0x00 will share insights from his SCCM research, including tradecraft from real-world attacks and a critical unauthenticated SQL injection discovery (CVE-2024-43468). Essential for anyone managing or defending SCCM! Learn more: x33fcon.com/#!s/MehdiElyas…
/ˈziːf-kɒn/ tweet media
English
0
7
18
2.4K
Pierre Milioni 리트윗함
SkelSec
SkelSec@SkelSec·
#pypykatz new version 0.6.11 is out on github and pip. Big thanks to all awesome contributors!! Besides the fixes, the two important things in this version: - Kerberos aes keys extraction is now supported - !!!!Windows 24H2 support is here!!!!! github.com/skelsec/pypyka…
English
5
52
142
14.5K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
In our latest article, @croco_byte proposes an implementation of a trick discovered by James Forshaw in his research. Discover how to perform pre-authenticated Kerberos relay over HTTP with our Responder and krbrelayx pull requests! synacktiv.com/publications/a…
English
0
93
233
28.6K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00. synacktiv.com/advisories/mic…
English
1
65
170
11.4K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
We really love relaying authentication: you can now also perform NTLM relaying on SCCM Management and Distribution points thanks to the PR from @croco_byte on ntlmrelayx (now merged upstream).
Synacktiv tweet media
English
1
40
143
8.4K
Pierre Milioni
Pierre Milioni@b1two_·
Thrilled to see it merged! Note: some tools may not integrate well (without tweaks) with ntlmrelayx due to, for instance, concurrent LDAP connections, SMB queries before LDAP communications, or starttls. Check this PR comment for details and workarounds: #issuecomment-2549682178" target="_blank" rel="nofollow noopener">github.com/fortra/impacke…
Synacktiv@Synacktiv

You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream). Here is an example with ldeep using relayed authentication from HTTP to LDAPs :

English
1
11
38
2.9K
Pierre Milioni 리트윗함
Dirk-jan
Dirk-jan@_dirkjan·
Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph 😃
English
6
119
346
36.1K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
We just rewrote the AsOutsider part of #AADInternals in Python to enhance compatibility and ease of use in Linux environments. You can find it here: github.com/synacktiv/AADO…
English
2
42
151
9.6K
Pierre Milioni 리트윗함
Nick Powers
Nick Powers@zyn3rgy·
[Tool & Blog release] - smbtakeover, a technique to unbind/rebind port 445 without loading a driver, loading a module into LSASS, or rebooting the target machine. The goal is to ease exploitation of targeted NTLM relay primitives while operating over C2. Github repo is linked at the bottom of the blog post, which provides technical analysis of the technique. posts.specterops.io/relay-your-hea…
English
8
115
268
29.9K
Pierre Milioni 리트윗함
Synacktiv
Synacktiv@Synacktiv·
Want to know how we prevented some CI/CD supply chain attacks against Microsoft, FreeRDP, AutoGPT, Ant-Design, Cypress, Excalidraw and others? Read the second article in our series on exploiting GitHub Actions by @hugow_vincent. synacktiv.com/publications/g…
English
1
25
70
6.2K
Pierre Milioni 리트윗함
Hugow
Hugow@hugow_vincent·
I've converted my @sstic talk on #GitHub action exploitation to a series of blogspots with additional details, here is the first part ☀️
Synacktiv@Synacktiv

We are starting a series of articles regarding GitHub action exploitation. In this first article, @hugow_vincent explains the different mechanisms of GitHub action that will be used in the following articles during exploitation. Learn the power of CI/CD! synacktiv.com/publications/g…

English
1
7
21
2.1K