Quentin Roland
@croco_byte
Pentester @Synacktiv 🤖
linkedin.com/in/quentin-rol…
ID: 1541102936213913601
26-06-2022 16:56:04
52 Tweet
251 Followers
33 Following
Abusing multicast poisoning for pre-authenticated Kerberos relay over HTTP with Responder and krbrelayx - Quentin Roland synacktiv.com/publications/a…
Synacktiv was at THConvention this week! For the first talk, Quentin Roland presented "Tapping into the SCCM policies goldmine". For the second talk, Remsio and Kain presented "Deep dive in Laravel encryption". #THCON2025
We still have a few talks for #SSTIC2025 last day! This morning, Hugo Clout presents 2 proxy tools used during pentests 🌐
My personal #defcon33 highlights: Better tools for GPO exploitation: media.defcon.org/DEF%20CON%2033… Critical vulns in Zscaler and Netskope: media.defcon.org/DEF%20CON%2033… Phishing on official Microsoft login: media.defcon.org/DEF%20CON%2033… SSH vulnerabilities: media.defcon.org/DEF%20CON%2033…
Afterwards, the great Quentin Roland took the stage, also at #OrangeCon, to present the authentication relay techniques he discovered earlier this year. As always, he illustrated his talk with a demo, showing that these techniques can be applied to real-world AD environments. 🔥
[Blogpost] Quentin Roland presents how to exploit attack paths related to Active Directory sites' ACLs. As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project: