's Avatar

@kevintell.bsky.social

27 Followers  |  135 Following  |  2 Posts  |  Joined: 29.11.2024  |  1.6387

Latest posts by kevintell.bsky.social on Bluesky

[Le Big Bang de l’Économie - Le Figaro] Cybersécurité : sommes-nous vraiment prêts ?
YouTube video by Synacktiv [Le Big Bang de l’Économie - Le Figaro] Cybersécurité : sommes-nous vraiment prêts ?

🇫🇷 During "Le Big Bang de l’Économie" by #LeFigaro, @kevintell.bsky.social gave a live pentest demo, showing how easily data can be exposed when systems aren’t properly secured: youtu.be/XVJUF1zt1FE

👉 Watch the whole show: video.lefigaro.fr/figaro/econo...

06.11.2025 14:56 — 👍 2    🔁 2    💬 0    📌 0
Preview
Catching Credential Guard Off Guard - SpecterOps Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.

Credential Guard was supposed to end credential dumping. It didn't.

Valdemar Carøe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.

Read for more: ghst.ly/4qtl2rm

23.10.2025 17:45 — 👍 17    🔁 11    💬 0    📌 0
Preview
The Phantom Extension: Backdooring chrome through uncharted pathways The Phantom Extension: Backdooring chrome through uncharted pathways

How safe is your browser?
Our ninja, Riadh Bouchahoua, uncovers how attackers can exploit Chromium extension loading to steal data, maintain persistent access, and breach confidentiality on Chromium-based browsers.
Read more here ⬇️
www.synacktiv.com/en/publicati...

26.09.2025 10:29 — 👍 3    🔁 2    💬 0    📌 0
Preview
DCOM Again: Installing Trouble - SpecterOps DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs

Lateral movement getting blocked by traditional methods?

@werdhaihai.bsky.social just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG

29.09.2025 19:00 — 👍 9    🔁 3    💬 0    📌 0
One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise ...

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-gl...

17.09.2025 13:20 — 👍 87    🔁 38    💬 9    📌 5
Post image Post image

🧑‍🎓 Boost your offensive Active Directory skills with our Entry & Advanced trainings. Hands-on labs with dozens of machines + latest research from DEFCON, x33fcon & more! Seats are limited, don’t miss out!
🔗 Entry: www.synacktiv.com/en/offers/tr...
🔗 Advanced: www.synacktiv.com/en/offers/tr...

12.09.2025 11:13 — 👍 4    🔁 2    💬 0    📌 0
Post image

DCOM is everywhere, but its inner workings feel like black magic. 🪄 Unveil the mystery with @kevintell.bsky.social's new article on DCOM basics. Trust us, it's way cooler than it sounds!

www.synacktiv.com/en/publicati...

16.09.2025 13:12 — 👍 8    🔁 3    💬 0    📌 0
Preview
Should you trust your zero trust? Bypassing Zscaler posture checks Introduction Posture checks are a key component of zero trust architectures.

🔒 Can you really trust your zero trust? We (re)discovered a vulnerability in Zscaler Client Connector that allowed bypassing device posture checks, and it was still exploitable in the wild. Full technical deep dive + remediation tips 👉 www.synacktiv.com/en/publicati...

08.08.2025 12:56 — 👍 5    🔁 4    💬 0    📌 0
Post image

🚨 Still a few days to register for our Azure Intrusion for Red Teamers training at #BHUSA! Very hands-on, full kill chain from zero to Global Admin with stealth in mind. Secure your seat now! www.blackhat.com/us-25/traini...

02.07.2025 09:26 — 👍 5    🔁 6    💬 0    📌 0
Post image

Our ninja @kalimer0x00.bsky.social is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the critical CVE-2024-43468 and the post-exploitation opportunities🔥

13.06.2025 14:46 — 👍 8    🔁 6    💬 0    📌 0
Post image

Azure intrusion for red teamers

by Paul Barbé & Matthieu Barjole

www.hexacon.fr/trainer/barb...

15.04.2025 14:46 — 👍 8    🔁 8    💬 0    📌 1
Preview
From NTLM relay to Kerberos relay: Everything you need to know While I was reading Elad Shamir recent excellent post about NTLM relay attacks, I decided to contribute a companion piece that dives into the mechanics of Kerberos relays, offering an analysis and …

I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️
decoder.cloud/2025/04/24/f...

28.04.2025 08:04 — 👍 8    🔁 3    💬 1    📌 0
Post image Post image Post image Post image

That's all folks! 👋 Thank you to everyone who attended & presented talks during our #SOCON2025 conference days. Our training courses kickoff tomorrow at 9AM back at Convene.

01.04.2025 23:34 — 👍 4    🔁 2    💬 0    📌 0
Responsable équipe reverse engineering

Synacktiv is looking for an additional team leader in Paris for its Reverse-Engineering Team!
Find out if you are a good candidate by reading our offer (🇫🇷).
www.synacktiv.com/responsable-...

28.03.2025 16:25 — 👍 7    🔁 6    💬 0    📌 0

It's great ! But would you consider a local alternative as sending customer data to a third party service during engagement is a big turn off for me

29.03.2025 09:44 — 👍 0    🔁 0    💬 1    📌 0

I had the privilege to attend this training at Synacktiv and it might be the best training you can get when it comes to Azure given by two guy who does Red Team all year round on this subject. Don't wait !

21.03.2025 18:03 — 👍 0    🔁 1    💬 0    📌 0
Preview
Abusing multicast poisoning for pre-authenticated Kerberos relay over HTTP with Responder and krbrelayx

In our latest article, @croco_byte proposes an implementation of a trick discovered by James Forshaw in his research regarding Kerberos relaying. Discover how to perform pre-authenticated Kerberos relay over HTTP with our Responder and krbrelayx pull requests!
www.synacktiv.com/publications...

27.01.2025 12:06 — 👍 16    🔁 12    💬 0    📌 1
Post image

Yay! Our offensive Azure training was accepted at BlackHat USA 2025 🥳 Can't wait to see you there and share cutting-edge techniques for attacking Azure environments!

20.01.2025 09:24 — 👍 9    🔁 7    💬 0    📌 0

@kevintell is following 20 prominent accounts