F4b's Avatar

F4b

@0xf4b.bsky.social

VR team tech lead @synacktiv.com

130 Followers  |  98 Following  |  1 Posts  |  Joined: 22.11.2024  |  1.6297

Latest posts by 0xf4b.bsky.social on Bluesky

Post image

Congrats to tek and anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process ๐Ÿ’ฅ

Letโ€™s keep pushing ๐Ÿ’ช

#P2OIreland #Synacktiv

21.10.2025 15:32 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Quantum readiness: Hybridizing key exchanges Quantum readiness: Hybridizing key exchanges

Our post-quantum cryptography series continues!

This new article by @bluesheeet.bsky.social unpacks the hybridization of key exchanges, covering theory and implementations.

Read all about why it matters, how to approach it safely, and some misconceptions here ๐Ÿ‘‡
www.synacktiv.com/en/publicati...

16.10.2025 14:49 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

LinkPro: new stealthy #Linux rootkit based on eBPF ๐Ÿ”๏ธ

Our #CSIRT team discovered and named LinkPro, a new Linux rootkit, during an incident response. It exploits eBPF for evasion and persistence.
Here are the four key technical points in the image below. ๐Ÿ’ก

๐Ÿ”— www.synacktiv.com/en/publicati...

14.10.2025 14:33 โ€” ๐Ÿ‘ 4    ๐Ÿ” 4    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

That's a wrap for Hexacon 2025!

We hope that you've enjoyed the event at least as much as we did ๐Ÿคฉ

Please take a moment to fill out our satisfaction survey and help us make Hexacon 2026 even better ๐Ÿ”ฅ

Thank you for trusting us year after year ๐Ÿ™

13.10.2025 14:38 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐ŸŽฏ New training session: #ActiveDirectory Intrusion Tactics โ€“ Advanced Level
5 intense days diving into advanced AD intrusion techniques.

Donโ€™t miss our upcoming offensive #cybersecurity courses!
๐Ÿ”— www.synacktiv.com/en/offers/tr...

13.10.2025 12:41 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
LLM Poisoning [1/3] - Reading the Transformer's Thoughts LLM Poisoning [1/3] - Reading the Transformer's Thoughts

LLM Poisoning [1/3]: Local LLMs are vulnerable to supply chain attacks.
Inject a trigger-activated Trojan in a LLM. First step, build a probe to read a transformer's pre-down MLP activations to detect your chosen trojan trigger.

๐Ÿ”— Full article www.synacktiv.com/en/publicati...

08.10.2025 15:52 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

#LesAssises2025, here we go ๐Ÿš€

Come and meet us at ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐—™๐Ÿฎ๐Ÿด to discuss your challenges and find out how we can strengthen your #cyber posture.
Adrien, Augustin and Neder will be on hand to answer all your questions and share their insights.

Seeing you there ๐Ÿค

08.10.2025 10:29 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image

A look back at our ninjas' first day at @hexacon.bsky.social !

We are proud of our experts Quentin and Etienne, who are leading the โ€˜iOS for Security Engineersโ€™ training course.
At the same time, Matthieu and Paul are hard at work on the โ€˜Azure intrusion for red teamersโ€™ training course ๐Ÿš€

07.10.2025 10:49 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ“ข"Paint it Blue: Attacking the Bluetooth stack" by Mehdi Talbi and Etienne Helluy-Lafont

03.10.2025 15:58 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Tick tock... 7 days to go until #Hexacon2025 kicks off โณ

The @synacktiv.com team can't wait to see you at this crucial event for the #cyber ecosystem.
Our experts will be on hand to discuss the latest innovations in pentesting and reverse engineering with you !

โ„น๏ธ www.hexacon.fr

03.10.2025 09:22 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
What could go wrong when MySQL strict SQL mode is off? What could go wrong when MySQL strict SQL mode is off?

In our new blogpost, Alexandre Z. shows how one can abuse Unicode characters to bypass filters and abuse shell globbing, regexp, HTTP query parameters or WAFs when #MySQL strict SQL mode is off ๐Ÿ‘‡
www.synacktiv.com/en/publicati...

03.10.2025 07:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Join us on 24 November for the Azure Intrusion Tactics training course ๐Ÿ›ก๏ธ

Learn offensive techniques for compromising Azure environments. Realistic scenarios, stealthy approaches and cutting-edge expertise.

Information & registration ๐Ÿ‘‡
www.synacktiv.com/en/offers/tr...

03.10.2025 14:26 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Last sponsor to announce: Synacktiv! ๐Ÿฅท

@synacktiv.com strives to help firms evaluate and improve their IT security, everybody there is working to make it the ๐Ÿ‡ซ๐Ÿ‡ท standard in offensive security.

There will a be a lot of ninjas lurking around, feel free to reach them out!

03.10.2025 08:16 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Post image

๐Ÿ“ข"Inside Apple Secure Enclave Processor in 2025" by Quentin Salingue

02.10.2025 15:21 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Sharing is caring โค๏ธ This month, our ninjas presented their research all over the world to the offsec community!

Links and more details below ๐Ÿ‘‡๏ธ

30.09.2025 15:23 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 5    ๐Ÿ“Œ 0
Preview
Quantum readiness: Hybridizing signatures Quantum readiness: Hybridizing signatures

Missed our post-quantum cryptography series?
In our latest article, we explore cryptographic hybridization, with a focus on digital signatures.
Learn how to ensure a safe transition and avoid basic implementations pitfalls here๐Ÿ‘‡
www.synacktiv.com/en/publicati...

29.09.2025 15:40 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
The Phantom Extension: Backdooring chrome through uncharted pathways The Phantom Extension: Backdooring chrome through uncharted pathways

How safe is your browser?
Our ninja, Riadh Bouchahoua, uncovers how attackers can exploit Chromium extension loading to steal data, maintain persistent access, and breach confidentiality on Chromium-based browsers.
Read more here โฌ‡๏ธ
www.synacktiv.com/en/publicati...

26.09.2025 10:29 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Exploring GrapheneOS secure allocator: Hardened Malloc Exploring GrapheneOS secure allocator: Hardened Malloc

A technical look at @grapheneos.org Hardened Malloc, a memory allocator designed to mitigate heap corruption vulnerabilities (UAF, overflows) and break common exploit primitives.
Deep dive for security researchers & exploit developers by @nicoski.bsky.social
www.synacktiv.com/en/publicati...

22.09.2025 13:41 โ€” ๐Ÿ‘ 11    ๐Ÿ” 6    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

This summer @synacktiv.com organized an interesting challenge: the aim was to craft a container image as small as possible which replicated itself (i.e. an OCI Image Quine), bsky.app/profile/syna....
I am now publishing a write-up of what I did (Rust/asm/code golfing/...): github.com/fishilico/sy...

18.09.2025 20:47 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

DCOM is everywhere, but its inner workings feel like black magic. ๐Ÿช„ Unveil the mystery with @kevintell.bsky.social's new article on DCOM basics. Trust us, it's way cooler than it sounds!

www.synacktiv.com/en/publicati...

16.09.2025 13:12 โ€” ๐Ÿ‘ 8    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Aaaand the first talk to be announced is... ๐Ÿฅ

Exploiting the Undefined: PWNing Firefox by Settling its Promises by Tao Yan & Edouard Bochin

12.09.2025 09:18 โ€” ๐Ÿ‘ 5    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Hexacon - Conference โ€“ Speakers Discover the accepted talks for this edition!

๐Ÿšจ Time to reveal our first-class lineup for HEXACON 2025! โœจ

A few training spots are still available if you want to join the party! ๐ŸŽ‰
Unfortunately, trainings + conference packs are sold out

www.hexacon.fr/conference/s...

12.09.2025 09:12 โ€” ๐Ÿ‘ 6    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image

๐Ÿง‘โ€๐ŸŽ“ Boost your offensive Active Directory skills with our Entry & Advanced trainings. Hands-on labs with dozens of machines + latest research from DEFCON, x33fcon & more! Seats are limited, donโ€™t miss out!
๐Ÿ”— Entry: www.synacktiv.com/en/offers/tr...
๐Ÿ”— Advanced: www.synacktiv.com/en/offers/tr...

12.09.2025 11:13 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿš€ Grab your seat for Sept 29! ๐Ÿš€
Join our Cloud Intrusion Tactics training for a hands-on overview of offensive security across AWS, Azure, GCP & Kubernetes. Seats are limited, donโ€™t miss out! ๐Ÿ‘‰ www.synacktiv.com/en/offers/tr...

05.09.2025 12:11 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

โšก๏ธ Ready for some Rust โš™๏ธ + hacking ๐Ÿ•ต๏ธโ€โ™‚๏ธ? Two of our ninjas will land in Florence ๐Ÿ‡ฎ๐Ÿ‡น for #rustLab2025!

๐Ÿ“… Nov 2โ€“4 ๐Ÿ”ฅ Workshop: Network Interception in Rust โ€“ Build a MITM Tool from Scratch

Hands-on. Real packets. Real fun. ๐Ÿ‘‰ rustlab.it/talks/networ...

03.09.2025 10:56 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Weโ€™re thrilled to announce Donncha ร“ Cearbhaill (@donncha.is) as our keynote speaker for HEXACON 2025! ๐Ÿ’ฅ

No doubt he has plenty of juicy stories up his sleeve ๐Ÿ‘พ

02.09.2025 08:46 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Extraction of Synology encrypted archives - Pwn2Own Ireland 2024 Context During Pwn2Own Ireland 2024 we targeted the BeeStation BST150-4T a NAS from Synology.

We've just released a tool to decrypt all Synology encrypted archives! We used it to compare SynologyPhotos versions and highlight our #Pwn2Own Ireland 2024 vulnerability on the BeeStation BST150-4T. Check out our blog post for more details.
www.synacktiv.com/en/publicati...

11.08.2025 12:02 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image Post image

๐Ÿ”ฅ A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO attacks in Active Directory. Proud of the team! ๐Ÿ™Œ cc @kalimer0x00.bsky.social @quent0x1.bsky.social @wilfri3d.bsky.social

11.08.2025 09:38 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@0xf4b is following 20 prominent accounts