Kévin Tellier
@k3vinTell
Followers
116
Following
56
Media
3
Statuses
69
🥷@Synacktiv Moved to : https://t.co/nznTy39Yi4
Joined December 2021
Our ninjas are in Vienna for the T-REX conference! 🎤 @k3vinTell delivered a session exploring advanced Red Team lateral movement techniques built on DCOM - a great opportunity to exchange practices with fellow experts. Thank you to the @oenb for hosting such a great event!
0
2
10
🔥 A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO attacks in Active Directory. Proud of the team! 🙌 cc @kalimer0x00 @quent0x1 @wil_fri3d
2
23
98
🚨 Les experts français de @Synacktiv transforment le Thermomix en démonstration de hacking :) Manipulation de température, messages personnalisés... tout est possible ! On vous raconte ça 👉 https://t.co/PEMzzMrvAA
#thermomix
1
7
19
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. https://t.co/EY5Z53w1ZT
5
263
598
Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. https://t.co/EY5Z53w1ZT
1
24
171
To those who set the bar 🥂 Global Cyber Skills Benchmark 2025 is over, and the leaderboard has spoken. Huge congrats to the top corporate #cybersecurity teams who crushed it in this global competition: 🥇 @Synacktiv 🥈 @GMOsecurity24 🥉 https://t.co/ScP85R5ljR
#HackTheBox
2
21
111
For the second year in a row, we managed to get first place at the #HackTheBox Business #CTF 2025! 🥇 Congratulations to @gmo_ierae and Downscope and thanks to @hackthebox_eu for the fun challenges! 🥳
1
23
92
You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream). Here is an example with ldeep using relayed authentication from HTTP to LDAPs :
5
120
386
You can now relay any protocol to SMB over Kerberos with https://t.co/5RNe2ykLAY and the latest PRs from @hugow_vincent. Thanks @_dirkjan for merging it! Here is an example from SMB to SMB:
9
202
600
I am excited to share with you my latest research - "DCOM Upload & Execute" An advanced lateral movement technique to upload and execute custom payloads on remote targets Forget about PSEXEC and dive in! https://t.co/ruQJlXgLqV
https://t.co/Yp25P6pZvH
github.com
DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely - GitHub - deepinstinct/DCOMUploadExec: DCOM Lateral movement POC abusing the IMsiServer interf...
12
247
597
Coffee break thoughts: "is it possible to bruteforce RPC endpoint to perform code exec if you can't access EPM/SMB?" 99% impacket atexec + 1% "for loop" = 100% prod ready https://t.co/1jecAPhXW0 (silent command only) h/t @saerxcit 🌻
0
60
172
Oh, you didn't know? Cool kids are now relaying Kerberos over SMB 😏 Check out our latest blogpost by @hugow_vincent to discover how to perform this attack: https://t.co/4Drnk4BoBz
synacktiv.com
Relaying Kerberos over SMB using krbrelayx
1
144
328
Octoscan, our GitHub actions vulnerability scanner, is now available as a GitHub action! It will find vulnerabilities in new commits and pull requests, and upload it to GitHub as it now supports the SARIF file format! https://t.co/lEcnccw8H3
github.com
📦 :octocat: A GitHub Action that performs a security scan of your GitHub Actions. - GitHub - synacktiv/action-octoscan: 📦 A GitHub Action that performs a security scan of your GitHub Actions.
0
13
54
Hi! We'd like to share our new research with you. You've probably heard about COM Hijacking, but we've found another way of persistence via COM. Typelib! Read the article here: https://t.co/UNujo5gwzU
1
48
95
Administrator Protection, introduced in the latest Windows Insider Canary build, is a solid security enhancement... uhh.. really?? can be bypassed with @splinter_code's clever SspiUacBypass tool. Check it out here: https://t.co/e1WWHi2Rnk
4
77
229
During a recent engagement, @Bandrel discovered how an attacker can craft a CSR by using default system certificates. After finding out this method was novel, the team kept digging. Read what they found in our new #blog!
trustedsec.com
Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…
4
126
260
Just wrapped up two fantastic training sessions at #Hexacon! A big thank you to everyone who joined us for our deep dives into Active Directory/Azure and iOS internals. It was great to share knowledge and learn together!
1
5
25