Clément Berthaux (@clementberthaux) 's Twitter Profile
Clément Berthaux

@clementberthaux

Security researcher @Synacktiv

ID: 2872768473

calendar_today11-11-2014 20:06:51

246 Tweet

301 Takipçi

220 Takip Edilen

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Have something to share? Don't forget to submit your lightning talk at [email protected] you might win our specially crafted Hexacon Champagne Cuvée 2023 #HEXACON2023 🍾

Have something to share? Don't forget to submit your lightning talk at It@hexacon.fr you might win our specially crafted Hexacon Champagne Cuvée 2023 #HEXACON2023 🍾
Hexacon (@hexacon_fr) 's Twitter Profile Photo

Thank you everyone for this amazing second edition! We hope you all had a blast and all the team is already eager to see you all next year for #HEXACON2024 🚀

Thank you everyone for this amazing second edition!

We hope you all had a blast and all the team is already eager to see you all next year for #HEXACON2024 🚀
Synacktiv (@synacktiv) 's Twitter Profile Photo

To facilitate reverse-engineering of large programs, vulnerability research and root-cause analysis on iOS, Android, and other major platforms, myr and Hexa released Frinet, a tool combining Frida with an enhanced version of Tenet. synacktiv.com/publications/f…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

That’s a wrap for Day 2 of #Pwn2Own Automotive. We’ve already awarded over $1,000,000 in prizes this week (¥150 million!) Tune back in tomorrow here or at the ZDI blog for the final day of the contest! Here are the current standings leading into the final day:

That’s a wrap for Day 2 of #Pwn2Own Automotive. We’ve already awarded over $1,000,000 in prizes this week (¥150 million!) Tune back in tomorrow here or at the ZDI blog for the final day of the contest! Here are the current standings leading into the final day:
Synacktiv (@synacktiv) 's Twitter Profile Photo

Congratulations to our ninja Remsio for making it to the 4th place with his research about error-based oracles using PHP filter chains!

Synacktiv (@synacktiv) 's Twitter Profile Photo

The Synacktiv ninjas are ready for the karen! 🥷 Come and meet us at Booth N°D45. We’re excited to share our expertise and discuss your challenges and the latest trends in cybersecurity. See you there! 👋 #InCyber2024

The Synacktiv ninjas are ready for the <a href="/FIC_eu/">karen</a>! 🥷
Come and meet us at Booth N°D45. We’re excited to share our expertise and discuss your challenges and the latest trends in cybersecurity. See you there! 👋
#InCyber2024
Synacktiv (@synacktiv) 's Twitter Profile Photo

If you ever get authenticated access on a Commvault CommServe web console < 11.34, you might be able to elevate privileges and execute remote commands. Check out how in the advisory by Guillaume André and Hugo Clout! synacktiv.com/advisories/dan…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninjas have been busy this weekend! The team solved all the challenges during #HTB #CyberApocalypse24, giving them 3rd place for now, while F4b scored the THConvention pre-challenge. Congratz! 🔥

Our ninjas have been busy this weekend! The team solved all the challenges during #HTB #CyberApocalypse24, giving them 3rd place for now, while <a href="/0xf4b/">F4b</a> scored the <a href="/ToulouseHacking/">THConvention</a> pre-challenge. Congratz! 🔥
Synacktiv (@synacktiv) 's Twitter Profile Photo

During a security assessment on Ricoh Device Manager NX, our ninja kalimero uncovered multiple vulnerabilities. When combined, these flaws could allow attackers to gain remote code execution on the server. Read the details in our advisory: synacktiv.com/sites/default/…

During a security assessment on Ricoh Device Manager NX, our ninja <a href="/kalimer0x00/">kalimero</a> uncovered multiple vulnerabilities. When combined, these flaws could allow attackers to gain remote code execution on the server.  Read the details in our advisory: synacktiv.com/sites/default/…
Synacktiv (@synacktiv) 's Twitter Profile Photo

Synacktiv is looking for an additional team leader for its Reverse-Engineering Team! Find out if you are a good candidate by reading our offer (🇫🇷). synacktiv.com/responsable-de…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Sometimes you just need to abuse functionalities to be a ninja! Discover how Collabora Online could be abused to conduct SSRFs and steal your cloud secrets. synacktiv.com/en/advisories/…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Ever faced a WAF/EDR while exploiting a Java deserialization? Checkout our latest blogpost by Load. for a stealthier exploitation, exfiltration and persistence by diving deep into translets, transformers and more! synacktiv.com/publications/j…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Following our recent research on PHP filter chains, our ninjas Remsio and Raphaël Lob found two arbitrary file leaks affecting the MISP project < 2.4.187. If you are intrigued by this kind of exploitation, take a look at: synacktiv.com/advisories/mis…

Synacktiv (@synacktiv) 's Twitter Profile Photo

If you're a regular Velociraptor user or just looking for a flexible forensic tool, come and discover how Velociraptor's new features make forensic analysis of VMware ESXi hypervisor possible. synacktiv.com/publications/v…