Wil (@wil_fri3d) 's Twitter Profile
Wil

@wil_fri3d

ID: 923829980592734208

calendar_today27-10-2017 08:33:26

146 Tweet

212 Takipçi

120 Takip Edilen

Synacktiv (@synacktiv) 's Twitter Profile Photo

Just wrapped up two fantastic training sessions at #Hexacon! A big thank you to everyone who joined us for our deep dives into Active Directory/Azure and iOS internals. It was great to share knowledge and learn together!

Just wrapped up two fantastic training sessions at #Hexacon! A big thank you to everyone who joined us for our deep dives into Active Directory/Azure and iOS internals. It was great to share knowledge and learn together!
Synacktiv (@synacktiv) 's Twitter Profile Photo

Oh, you didn't know? Cool kids are now relaying Kerberos over SMB 😏 Check out our latest blogpost by Hugow to discover how to perform this attack: synacktiv.com/publications/r…

Synacktiv (@synacktiv) 's Twitter Profile Photo

You can now relay any protocol to SMB over Kerberos with krbrelayx.py and the latest PRs from Hugow. Thanks Dirk-jan for merging it! Here is an example from SMB to SMB:

You can now relay any protocol to SMB over Kerberos with krbrelayx.py and the latest PRs from <a href="/hugow_vincent/">Hugow</a>.
Thanks <a href="/_dirkjan/">Dirk-jan</a> for merging it!
Here is an example from SMB to SMB:
Synacktiv (@synacktiv) 's Twitter Profile Photo

You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from Pierre Milioni (now merged upstream). Here is an example with ldeep using relayed authentication from HTTP to LDAPs :

You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from <a href="/b1two_/">Pierre Milioni</a> (now merged upstream).
Here is an example with ldeep using relayed authentication from HTTP to LDAPs :
Synacktiv (@synacktiv) 's Twitter Profile Photo

A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by kalimero. synacktiv.com/advisories/mic…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Yay! Our offensive Azure training was accepted at BlackHat USA 2025 🥳 Can't wait to see you there and share cutting-edge techniques for attacking Azure environments!

Yay! Our offensive Azure training was accepted at BlackHat USA 2025 🥳 Can't wait to see you there and share cutting-edge techniques for attacking Azure environments!
Synacktiv (@synacktiv) 's Twitter Profile Photo

We've just updated our training catalog to include the latest additions, including a brand new course on ransomware investigations! Find all the dates and details at synacktiv.com/en/offers/trai…

We've just updated our training catalog to include the latest additions, including a brand new course on ransomware investigations!
Find all the dates and details at synacktiv.com/en/offers/trai…
Synacktiv (@synacktiv) 's Twitter Profile Photo

In our latest article, Quentin Roland and Scaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav HTTP authentication, enhancing the NTLM and Kerberos relaying capabilities of multicast poisoning attacks! synacktiv.com/publications/t…

Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Thanks to @synacktiv's recent posts about Kerberos synacktiv.com/en/publication… and recent PR's Dirk-jan 's krbrelayx.py tool it made me realize ELEVATE-2 is still in play where client push installation is in use.

Synacktiv (@synacktiv) 's Twitter Profile Photo

Want to master cutting-edge techniques for attacking Azure? Join us this summer at Black Hat in Vegas for a deep dive into red teaming on Azure, M365, Azure DevOps, and hybrid infrastructures. Early bird tickets available until May 23rd! blackhat.com/us-25/training…

Want to master cutting-edge techniques for attacking Azure? Join us this summer at <a href="/BlackHatEvents/">Black Hat</a> in Vegas for a deep dive into red teaming on Azure, M365, Azure DevOps, and hybrid infrastructures. Early bird tickets available until May 23rd! blackhat.com/us-25/training…
Synacktiv (@synacktiv) 's Twitter Profile Photo

🚀 This week, Us3r777 & Pierre kick off our new Whitebox Vulnerability Research training! Students will dive into PHP, Java, and .NET, analyzing & exploiting 1-day vulnerabilities. Let’s get started! 💻🔍

🚀 This week, <a href="/us3r777/">Us3r777</a> &amp; <a href="/__pierreg/">Pierre</a> kick off our new Whitebox Vulnerability Research training! Students will dive into PHP, Java, and .NET, analyzing &amp; exploiting 1-day vulnerabilities. Let’s get started! 💻🔍
/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Got SCCM? You need to hear this! At #x33fcon, kalimero will share insights from his SCCM research, including tradecraft from real-world attacks and a critical unauthenticated SQL injection discovery (CVE-2024-43468). Essential for anyone managing or defending SCCM! Learn

Got SCCM? You need to hear this! At #x33fcon, <a href="/kalimer0x00/">kalimero</a> will share insights from his SCCM research, including tradecraft from real-world attacks and a critical unauthenticated SQL injection discovery (CVE-2024-43468). Essential for anyone managing or defending SCCM!

Learn
Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…

Wil (@wil_fri3d) 's Twitter Profile Photo

Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !

Pixis (@hackanddo) 's Twitter Profile Photo

I'm not sure everyone realizes it, but as it stands, if you have an Active Directory with default configurations, any machine (except DCs) that hasn't applied the June 10 patch can be compromised by any domain user.

LazyTitan (@lazytitan33) 's Twitter Profile Photo

Excellent article from Synacktiv detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not enforced. I have already replicated it and works a charm. If you still aren't enforcing SMB signing... what are you doing?! Harden your environment & patch!

Excellent article from <a href="/Synacktiv/">Synacktiv</a> detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not enforced. I have already replicated it and works a charm. If you still aren't enforcing SMB signing... what are you doing?! Harden your environment &amp; patch!
Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninja kalimero is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the critical CVE-2024-43468 and the post-exploitation opportunities🔥

Our ninja <a href="/kalimer0x00/">kalimero</a> is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the critical CVE-2024-43468 and the post-exploitation opportunities🔥