kalimero (@kalimer0x00) 's Twitter Profile
kalimero

@kalimer0x00

ID: 758571226168188928

calendar_today28-07-2016 07:54:08

529 Tweet

356 Followers

834 Following

Synacktiv (@synacktiv) 's Twitter Profile Photo

Got access to a #CICD environment? Check out our latest article by Théo Louis-Tisserand and Hugow to loot all the secrets that are supposed to be securely stored in pipelines and meet Nord Stream, a new tool developed to automate the extraction process! synacktiv.com/publications/c…

Synacktiv (@synacktiv) 's Twitter Profile Photo

During a security assessment, our ninjas kalimero and Us3r777 found multiple vulnerabilities on the DELMIA Apriso software: CVE-2023-2141: an unsafe deserialization CVE-2023-2140: a pre-auth SSRF CVE-2023-2139: a reflected XSS synacktiv.com/sites/default/…

During a security assessment, our ninjas <a href="/kalimer0x00/">kalimero</a> and <a href="/us3r777/">Us3r777</a> found multiple vulnerabilities on the DELMIA Apriso software:

CVE-2023-2141: an unsafe deserialization
CVE-2023-2140: a pre-auth SSRF
CVE-2023-2139: a reflected XSS

synacktiv.com/sites/default/…
Synacktiv (@synacktiv) 's Twitter Profile Photo

Have you ever wanted to extract, decode and decrypt all NTDS.dit data? We are glad to share with you a new tool: ntdissector by kalimero and Julien Legras, powered by the awesome lib dissect.esedb from Fox-IT! More info in the blogpost: synacktiv.com/publications/i…

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Last sponsor we want to introduce is a special one: it's Synacktiv, the company organizing #HEXACON2023. Leader in offensive security, Synacktiv helps companies assess their networks's security. There will be a lot of ninjas in the conference, feel free to talk to them! 🤗

Last sponsor we want to introduce is a special one: it's <a href="/Synacktiv/">Synacktiv</a>, the company organizing #HEXACON2023.
 
Leader in offensive security, Synacktiv helps companies assess their networks's security.

There will be a lot of ninjas in the conference, feel free to talk to them! 🤗
Synacktiv (@synacktiv) 's Twitter Profile Photo

Bored of managing multiple proxychains configurations? Hugo Clout developed bbs, a swiss army knife proxy manager for red teamers! The project is available on our GitHub: github.com/synacktiv/bbs

Synacktiv (@synacktiv) 's Twitter Profile Photo

Ever faced a WAF/EDR while exploiting a Java deserialization? Checkout our latest blogpost by Load. for a stealthier exploitation, exfiltration and persistence by diving deep into translets, transformers and more! synacktiv.com/publications/j…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Optimize your password spraying attacks & defenses by checking our latest blogpost on the Banned Password Lists (BPL) mechanism of Entra ID Password Protection: synacktiv.com/en/publication…

Synacktiv (@synacktiv) 's Twitter Profile Photo

WHFB on an Entra ID enrolled laptop? Dig with t0 ,@yofbalibump and Rémi J. on the cache mechanisms in place ! synacktiv.com/publications/w…

Synacktiv (@synacktiv) 's Twitter Profile Photo

In our latest blogpost, Quentin Roland explores the inner workings of SCCM policies and introduces SCCMSecrets.py, a tool targeting secret policies in order to exploit misconfigurations, harvest credentials, and pivot across collections by impersonating legitimate clients.

Synacktiv (@synacktiv) 's Twitter Profile Photo

A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by kalimero. synacktiv.com/advisories/mic…

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Got SCCM? You need to hear this! At #x33fcon, kalimero will share insights from his SCCM research, including tradecraft from real-world attacks and a critical unauthenticated SQL injection discovery (CVE-2024-43468). Essential for anyone managing or defending SCCM! Learn

Got SCCM? You need to hear this! At #x33fcon, <a href="/kalimer0x00/">kalimero</a> will share insights from his SCCM research, including tradecraft from real-world attacks and a critical unauthenticated SQL injection discovery (CVE-2024-43468). Essential for anyone managing or defending SCCM!

Learn
Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninja kalimero is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the critical CVE-2024-43468 and the post-exploitation opportunities🔥

Our ninja <a href="/kalimer0x00/">kalimero</a> is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the critical CVE-2024-43468 and the post-exploitation opportunities🔥
/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

"Owning #SCCM: A Journey from #Research to Critical Discovery" presented by kalimero - #x33fcon #windows #red - github.com/synacktiv/sccm…

"Owning #SCCM: A Journey from #Research to Critical Discovery" presented by <a href="/kalimer0x00/">kalimero</a> - #x33fcon #windows #red - github.com/synacktiv/sccm…
SpecterOps (@specterops) 's Twitter Profile Photo

SCCM’s Management Points can leak more than you’d expect. Garrett shows how Network Access Accounts, Task Sequences, and Collection Settings can be stolen by relaying a remote Management Point to the site database. Check it out ⬇️ ghst.ly/4eNLaHU