Pierre Milioni

75 posts

Pierre Milioni

Pierre Milioni

@b1two_

เข้าร่วม Kasım 2018
238 กำลังติดตาม280 ผู้ติดตาม
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
From legacy WEP to WPA3-Enterprise: sharing our recent #WiFi field experiences. 📡 We detail various scenarios to better understand the risks, including WPA3 PEAP relaying & optimized online PSK brute-forcing. ⤵️ synacktiv.com/en/publication…
English
0
30
63
6.7K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
🧑‍🎓 Boost your offensive Active Directory skills with our Entry & Advanced trainings. Hands-on labs with dozens of machines + latest research from DEFCON, x33fcon & more! Seats are limited, don’t miss out! 🔗 Entry: synacktiv.com/en/offers/trai… 🔗 Advanced: synacktiv.com/en/offers/trai…
Synacktiv tweet mediaSynacktiv tweet media
English
0
11
20
2.9K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: github.com/synacktiv/Grou… This python utility offers a stable, modular and stealthy exploitation framework targeting Group Policy Objects in Active Directory!
English
1
99
239
17.7K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. synacktiv.com/publications/n…
English
5
259
598
209.4K
Pierre Milioni รีทวีตแล้ว
/ˈziːf-kɒn/
/ˈziːf-kɒn/@x33fcon·
Got SCCM? You need to hear this! At #x33fcon, @kalimer0x00 will share insights from his SCCM research, including tradecraft from real-world attacks and a critical unauthenticated SQL injection discovery (CVE-2024-43468). Essential for anyone managing or defending SCCM! Learn more: x33fcon.com/#!s/MehdiElyas…
/ˈziːf-kɒn/ tweet media
English
0
7
18
2.4K
Pierre Milioni รีทวีตแล้ว
SkelSec
SkelSec@SkelSec·
#pypykatz new version 0.6.11 is out on github and pip. Big thanks to all awesome contributors!! Besides the fixes, the two important things in this version: - Kerberos aes keys extraction is now supported - !!!!Windows 24H2 support is here!!!!! github.com/skelsec/pypyka…
English
5
52
142
14.5K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
In our latest article, @croco_byte proposes an implementation of a trick discovered by James Forshaw in his research. Discover how to perform pre-authenticated Kerberos relay over HTTP with our Responder and krbrelayx pull requests! synacktiv.com/publications/a…
English
0
93
233
28.6K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00. synacktiv.com/advisories/mic…
English
1
65
170
11.4K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
We really love relaying authentication: you can now also perform NTLM relaying on SCCM Management and Distribution points thanks to the PR from @croco_byte on ntlmrelayx (now merged upstream).
Synacktiv tweet media
English
1
40
143
8.4K
Pierre Milioni
Pierre Milioni@b1two_·
Thrilled to see it merged! Note: some tools may not integrate well (without tweaks) with ntlmrelayx due to, for instance, concurrent LDAP connections, SMB queries before LDAP communications, or starttls. Check this PR comment for details and workarounds: #issuecomment-2549682178" target="_blank" rel="nofollow noopener">github.com/fortra/impacke…
Synacktiv@Synacktiv

You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream). Here is an example with ldeep using relayed authentication from HTTP to LDAPs :

English
1
11
38
2.9K
Pierre Milioni รีทวีตแล้ว
Dirk-jan
Dirk-jan@_dirkjan·
Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph 😃
English
6
119
346
36.1K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
GitLab recently released a patch for the Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409). Our ninjas @alexisdanizan and @b1two_ analyzed the patch and wrote the exploit code! github.com/synacktiv/CVE-…
English
0
35
127
8.1K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
We just rewrote the AsOutsider part of #AADInternals in Python to enhance compatibility and ease of use in Linux environments. You can find it here: github.com/synacktiv/AADO…
English
2
42
151
9.6K
Pierre Milioni รีทวีตแล้ว
Nick Powers
Nick Powers@zyn3rgy·
[Tool & Blog release] - smbtakeover, a technique to unbind/rebind port 445 without loading a driver, loading a module into LSASS, or rebooting the target machine. The goal is to ease exploitation of targeted NTLM relay primitives while operating over C2. Github repo is linked at the bottom of the blog post, which provides technical analysis of the technique. posts.specterops.io/relay-your-hea…
English
8
115
268
29.9K
Pierre Milioni รีทวีตแล้ว
Synacktiv
Synacktiv@Synacktiv·
Want to know how we prevented some CI/CD supply chain attacks against Microsoft, FreeRDP, AutoGPT, Ant-Design, Cypress, Excalidraw and others? Read the second article in our series on exploiting GitHub Actions by @hugow_vincent. synacktiv.com/publications/g…
English
1
25
70
6.2K
Pierre Milioni รีทวีตแล้ว
Hugow
Hugow@hugow_vincent·
I've converted my @sstic talk on #GitHub action exploitation to a series of blogspots with additional details, here is the first part ☀️
Synacktiv@Synacktiv

We are starting a series of articles regarding GitHub action exploitation. In this first article, @hugow_vincent explains the different mechanisms of GitHub action that will be used in the following articles during exploitation. Learn the power of CI/CD! synacktiv.com/publications/g…

English
1
7
21
2.1K
Pierre Milioni รีทวีตแล้ว
Nathan Blondel
Nathan Blondel@slowerzs·
I wrote a blogpost on injecting code into a PPL process on Windows 11, without abusing any vulnerable driver. blog.slowerzs.net/posts/pplsyste…
English
3
241
599
49.9K