Aurélien Chalot
@Defte_
Followers
4K
Following
3K
Media
72
Statuses
2K
Hacker, sysadmin and security researcher @OrangeCyberdef 💻 Calisthenic enthousiast 💪 and wannabe philosopher https://t.co/SqDDhIGGGh 📖 🔥 Hide&Sec 🔥
The grid
Joined November 2017
Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳
5
194
928
"Windows has a design flaw in driver validation. If certificate revocation checks fail or time out (which happens often), Windows assumes the certificate is fine and loads the driver anyway."🥴 source: https://t.co/bBM6KAmbGk
https://t.co/ExN8StWw8Z IOCs:
github.com
Sophos-originated indicators-of-compromise from published reports - sophoslabs/IoCs
The commercial packer that lets ransomware groups kill your EDR 😵💫HeartCrypt bundles ransomware with EDR-disabling drivers (many signed with revoked or stolen certificates) and keeps evolving as vendors chase it. Groups like MedusaLocker, RansomHub, and BlackSuit are already
6
64
285
Hope you liked it! If you wanna read the entire journey about how I integrated Channel Binding into MSSQL, here is the blogpost :) https://t.co/uAMygziNw1
blog.whiteflag.io
This blogpost sums up the journey I had revisiting the tds.py script from the Impacket toolkit in order to implement Channel Binding on mssqlclient.py
🎤 Ce vendredi 28 novembre @Defte_ , pentester chez Orange Cyberdefense, présentera sa conférence : “Channel Binding with MSSQL: A Deep Dive into TDS, NTLM & STARTTLS Madness” 📅 @GrehackConf : 28-29 novembre 2025 📍 Grenoble Programme 👉 https://t.co/QixKDxRIWe
0
4
22
A new module just got merged into NetExec: raisechild🔥 Made by azoxlpf to automatically abuse domain trust to pivot to other domains. It will: - Dump the krbtgt hash of the child domain - Enumerate trusted domains - Craft a TGT for trusted/parent domain
3
80
378
Thas one of the stupidest fuckery I have seen in 2025 🤣🤣🤣
Multiple, serious security vulnerabilities found in the Rust clone of Sudo — which shipped with Ubuntu 25.10 (the most recent release). Not little vulnerabilities: We’re talking about the disclosure of passwords and total bypassing of authentication. In fact, we’re getting new
1
0
15
Can't believe I missed that browser cache smuggling huge upgrade https://t.co/6HUe9ijOol great job!!
malwaretech.com
Detailing an improved Cache Smuggling technique to turn 3rd party software into passive malware downloader.
1
8
32
If you are not assisting the con', don't worry, I'll publish the related blogpost soon enough and it will be a 30 minutes long one 👀🥳
🎙️ Tiering Active Directory : La Théorie, La Pratique… et le Crash Test Nous serons présents à @UYBHYS le samedi 8 novembre à #Brest 🎤 Notre pentester @Defte_ y partagera son retour d’expérience sur le Tiering Active Directory. En savoir plus 👉 https://t.co/0dAedupSqZ
2
1
31
This PR from fulc2um https://t.co/SD7Wc8G4Yr implements Shadow RDP on Impacket, this is so fking cool omgggg
github.com
This pull request brings necessary enumerations to tsts.py and tstool.py to utilize the Shadowing features of Remote Desktop services: https://swarm.ptsecurity.com/remote-desktop-services-shadowin...
3
56
207
Really great blogpost about bypassing client isolation on wifi networks (WPA till 2 and public) from Ben Knight
pulsesecurity.co.nz
WiFi network client isolation is a security feature that prevents WiFi devices connected to the same access point or network from communicating directly with each other. This article will show how to...
0
39
155
Tools such as https://t.co/U4xhJmroTe from Impacket are usually flagged for lateral movement due to the pre-built service executable that is dropped on the remote system. However, some vendors also flag Impacket based on its behaviour. With RustPack, you can easily create
4
122
615
Small update on "printerbugnew:" added a description of how to exploit CVE-2025-54918: DCs running 2025 allow reflection RPC->LDAPS - from a standard user to DA before patch😃
github.com
The DCERPC only printerbug.py version. Contribute to decoder-it/printerbugnew development by creating an account on GitHub.
2
78
247
NetExec turned 2 years old this month🎉 Time to take a look at what have achieved so far! As I love stats, I want to share some imo interesting numbers about NetExec: 4,853⭐ ~100,000 clones/14 days => ~2,4mio clones ~7,200 unique clones/14 days => ~172,800 unique clones 1/4🧵
5
21
142
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
308
658
🔥🔥
#UYBHYS [Samedi 8/11 14h15] CONFÉRENCE de @Defte_ (@OrangeCyberFR) Tiering Active Directory : La Théorie, La Pratique… et le Crash Test https://t.co/JEYHeiuusA
#UYBHYS25
0
1
15
If u had issues relaying the ADCS server to itself via the NTLM reflection exploit via ntlmrelayx, it's now fixed https://t.co/I6VOfsImlY :)
github.com
This PR fixes #2054 Exception was triggered because the username was set as the CommonName of the CSR. When the username was not given (coerced machine account) that exception was being triggered U...
0
15
116
So I have been told threat actors use my Browser Cache Smuggling technique to compromise people: https://t.co/A9qn5HGZJ9 Remember, detection is really easy: any process touching a browser's cache file and moving it to a .dll one IS A RED FLAG. Detection rule is easy to set ;)!
expel.com
We recently observed an innovative campaign using the ClickFix attack tactic for cache smuggling. Here's what you need to know.
1
41
161
In our new blogpost, @noraj_rawsec shows how one can abuse Unicode characters to bypass filters and abuse shell globbing, regexp, HTTP query parameters or WAFs when #MySQL strict SQL mode is off 👇 https://t.co/2Omr4hcX6Q
synacktiv.com
What could go wrong when MySQL strict SQL mode is off?
0
14
47
If you weren't able to reproduce the ntlm reflection cross protocol attack ctjf, @al3x_n3ff and I described (targetting ChannelBinding protected endpoints), its because ntlmrelayx was broken. Git pull the latest version and it will work :) (thx gabrielg5 and anadrianmanrique)
Update on the NTLM reflection attack: ctjf discovered that SMB signing enforcement does NOT protect against the NTLM reflection attack🛡 Cross-protocol relaying is still possible, even with mitigations in place. Only patching your system fully mitigates the vulnerability! 1/4🧵
0
20
109
Guess what, when implementing channel binding token to Impacket I simply forgot to implement it into NetExec as well... Incoming soon (eyes)
0
8
87
That was an interesting case about NTLM reflection but yeah, any machine that does not have th patch is vulnerable and it completely bypasses Channel Binding token (ie: we poced the relay from a ADCS server back to its fully HTTP web enroll endpoint and got the cert) pretty fun!
Update on the NTLM reflection attack: ctjf discovered that SMB signing enforcement does NOT protect against the NTLM reflection attack🛡 Cross-protocol relaying is still possible, even with mitigations in place. Only patching your system fully mitigates the vulnerability! 1/4🧵
0
27
187