Quentin Roland

70 posts

Quentin Roland

Quentin Roland

@croco_byte

Pentester @Synacktiv 🤖 https://t.co/FhHN2RnPym

Katılım Haziran 2022
37 Takip Edilen324 Takipçiler
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
HID recently disclosed HID-PSA-2025-002, a critical flaw in the #ActivID Authentication Appliance 8.7. In our new blog post, @us3r777 and @__pierreg break down exactly how they uncovered it, from methodology to exploitation 💡 Read it here ⬇️ synacktiv.com/en/publication…
English
0
11
21
3K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
[Blogpost] @croco_byte presents how to exploit attack paths related to Active Directory sites' ACLs. As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project: synacktiv.com/en/publication…
English
0
26
62
6.6K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
Afterwards, the great @croco_byte took the stage, also at #OrangeCon, to present the authentication relay techniques he discovered earlier this year. As always, he illustrated his talk with a demo, showing that these techniques can be applied to real-world AD environments. 🔥
Synacktiv tweet media
English
0
2
4
514
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
How safe is your browser? Our ninja, Riadh Bouchahoua, uncovers how attackers can exploit Chromium extension loading to steal data, maintain persistent access, and breach confidentiality on Chromium-based browsers. Read more here ⬇️ synacktiv.com/en/publication…
English
1
23
81
5.8K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
🧑‍🎓 Boost your offensive Active Directory skills with our Entry & Advanced trainings. Hands-on labs with dozens of machines + latest research from DEFCON, x33fcon & more! Seats are limited, don’t miss out! 🔗 Entry: synacktiv.com/en/offers/trai… 🔗 Advanced: synacktiv.com/en/offers/trai…
Synacktiv tweet mediaSynacktiv tweet media
English
0
11
20
2.9K
mpgn
mpgn@mpgn_x64·
Writeup from @mael91620 is now available 🎉 From coerce into SPN less RBDC, gmsa decryption, dpapi, constraint delegation w/t protocol transition​ to ntds dissection ! 😈 Congrats to the one who solved it 🥇@rayanlecat 🥈@_bluesheet & 🐊 🥉@_sans23 ➡️github.com/mael91620/Barb…
mpgn@mpgn_x64

I can confirm there will be a Windows Active Directory lab at @_barbhack_ 🏴‍☠️ This is an insane lab for the time allowed, be prepare and make sure your tools are up to date ! 🎯👿

English
4
38
141
12K
Quentin Roland retweetledi
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
🛠️ GroupPolicyBackdoor - a python utility for Group Policy Objects (GPOs) manipulation and exploitation. ✅ GPO attack vectors can very often lead to impactful privilege escalation scenarios in Active Directory environments. github.com/synacktiv/Grou…
English
0
9
43
2.2K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: github.com/synacktiv/Grou… This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
English
1
99
239
17.7K
Quentin Roland
Quentin Roland@croco_byte·
@mjc91295814 @wil_fri3d Hi! The tool will be published during next week on Synacktiv's Github, we'Il announce the release with a tweet 😀
English
1
0
1
74
cmjlove
cmjlove@mjc91295814·
@wil_fri3d hello,When was the GroupPolicyBackdoor tool introduced in the presentation released?
English
1
0
0
594
Wil
Wil@wil_fri3d·
gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: github.com/synacktiv/gpoP… It is a specialized utility designed to enumerate Group Policy Objects (GPOs) and identify potential security misconfigurations.
English
4
168
494
29.4K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
🔥 A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO attacks in Active Directory. Proud of the team! 🙌 cc @kalimer0x00 @quent0x1 @wil_fri3d
Synacktiv tweet mediaSynacktiv tweet mediaSynacktiv tweet media
English
2
23
98
6.9K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
Don't miss @kalimer0x00 at #DEFCON33! His talk, "SCCM: The Tree That Always Bears Bad Fruits", covers modern attack paths and abuse techniques in Microsoft SCCM, with a focus on internals, post-exploitation, and persistence! #content_60392" target="_blank" rel="nofollow noopener">defcon.org/html/defcon-33… #DEFCON #SCCM
Synacktiv tweet media
English
1
21
76
7K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
Catch us at #DEFCON33! @quent0x1 and @wil_fri3d will show how to turn your Active Directory into the attacker’s C2. They'll dive deep into how Group Policy Objects can be leveraged for stealthy enumeration and privilege escalation! #content_60387" target="_blank" rel="nofollow noopener">defcon.org/html/defcon-33… #DEFCON #ActiveDirectory
Synacktiv tweet media
English
0
15
47
3.4K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. synacktiv.com/publications/n…
English
5
259
598
209.3K
Quentin Roland retweetledi
Wil
Wil@wil_fri3d·
Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !
Synacktiv@Synacktiv

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. synacktiv.com/publications/n…

English
1
23
167
17.2K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
For our last talk, @croco_byte explains how to exploit SCCM policies to harvest credentials 🔑 #SSTIC2025
Synacktiv tweet media
English
2
8
23
2.5K
Quentin Roland retweetledi
Synacktiv
Synacktiv@Synacktiv·
We still have a few talks for #SSTIC2025 last day! This morning, @hugoclout presents 2 proxy tools used during pentests 🌐
Synacktiv tweet media
English
0
6
20
2.1K