Akhalash
337 posts

Akhalash retweetledi

[🎙️ #Talk] Discover #leHACK 2024 talk: Physical intrusion: Defeating on-site security presented by @Joker2a1 & Léo Renson-Miquel (aka El0_)
📅 Friday, July 5th
⌚ 15:30
ℹ️ Details: buff.ly/3VwMLd4
🎟️ Tickets: buff.ly/3Vcrbtg
GIF
English


@JuBoudouresques Non rien à voir
Je suis né un 16 décembre 😉
Français
Akhalash retweetledi

There it is: bit.ly/3hfyn7L
My first #OSINT article talking about #Twitch
I tried to make something as complete as possible.
Do not hesitate to send me feedbacks!
Something way bigger will come in the future 👀
KrowZ@ZworKrowZ
Tomorrow I'll be releasing my first #OSINT article. It took me several weeks of work and it is related to #Twitch Hope you'll find it useful :)
English

We did it 😃! What a blast to be part of a team able to claim the title of Master of Pwn! Kudos to all other participants and to @thezdi for the flawless organization.
Let’s wait for the patches, then we’ll share the technical details with the community 🤙
TrendAI Zero Day Initiative@thezdi
Here are the final Master of Pwn standings. Congrats to @Synacktiv on claiming the title. It was a close race, but they pull through.
English
Akhalash retweetledi

Trying to reproduce the #Exchange #Autodiscover vulnerability with two different Outlook version (Microsoft Office Pro Plus 2016 and two different builds from Pro Plus 2019), did not achieve to reproduce behaviour identified by #Guardicore (1/5)
English
Akhalash retweetledi

Exploiting very old vulnerability on Age of Empire I (Gold Edition) : tomtombinary.xyz/articles/age-o…
English
Akhalash retweetledi

Now that the bugs are patched, we are excited to share the details of our exploit chain!
Pwn2Own Vancouver 2021 :: Microsoft Exchange Server Remote Code Execution: srcincite.io/blog/2021/08/2…
TrendAI Zero Day Initiative@thezdi
Success! @steventseeley was able to get code execution (and a reverse shell) on #Microsoft #Exchange. He's headed off to the disclosure Zoom to dish all the details of his exploit chain. #Pwn2Own
English
Akhalash retweetledi

Disable spooler service on all DC and sensitive servers is a good practice ;
Flush legacy groups like 'Pre-Windows 2000 Compatible Access' is a good practice.
Unless you've very good justifications, trust me, you don't have to choose, #PrintNightmare or not.

English














