<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>Offensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.</description><link>https://bsky.app/profile/synacktiv.com</link><title>@synacktiv.com - Synacktiv</title><item><link>https://bsky.app/profile/synacktiv.com/post/3ml3wt3cvms2u</link><description>🚀 Join #Synacktiv at #x33fcon for two hands-on trainings (June 8–10):&#xA;&#xA;🔐 Azure Intrusion Tactics (intermediate): x33fcon.com#!t/MattheuBa...&#xA;🖥️ Advanced Active Directory Red Teaming (advanced)&#xA;Led by our experts: x33fcon.com#!t/WilfriedB...&#xA;&#xA;Sharpen your offensive skills in realistic environments!</description><pubDate>05 May 2026 10:06 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3ml3wt3cvms2u</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mkpurquyks2w</link><description>This second blogpost concludes @yaumn.bsky.social&#39;s research on #Windows authentication reflection.&#xA;He discloses the new Kerberos authentication coercion technique he discovered to remotely compromise Windows systems 💥&#xA;&#xA;A little bonus is even included at the end 👀👇&#xA;https://www.synacktiv.com/en/publications/bypassing-windows-authentication-reflection-mitigations-for-system-shells-part</description><pubDate>30 Apr 2026 14:57 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mkpurquyks2w</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mkk2ohzazs2y</link><description>Authentication reflection attacks are still not dead!&#xA;&#xA;In our new blogpost series, @yaumn.bsky.social shares his journey into bypassing the mitigations of CVE-2025-33073 to pop SYSTEM shells again! 🚀&#xA;&#xA;👇&#xA;https://www.synacktiv.com/en/publications/bypassing-windows-authentication-reflection-mitigations-for-system-shells-part-1</description><pubDate>28 Apr 2026 07:27 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mkk2ohzazs2y</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mk66wbttd22q</link><description>Tomorrow, @yaumn.bsky.social will be presenting his research on Windows authentication reflection at @blackhatevents.bsky.social Asia 2026 in Singapore!&#xA;&#xA;The talk will be at 15:20 local time in Simpor Junior Ballroom 4810, come say hi! 😄&#xA;&#xA;#BHASIA&#xA;&#xA;ℹ️ https://blackhat.com/asia-26/briefings/schedule/index.html?day=friday#the-gift-that-keeps-on-giving-bypassing-authentication-reflection-mitigations-for-system-shells-51084</description><pubDate>23 Apr 2026 14:11 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mk66wbttd22q</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mk63hwqiqc2q</link><description>Say hi to Pike!&#xA;&#xA;Our latest article introduces #Pike, an experimental #LLM agent that generates &amp; analyses #Linux execution traces to:&#xA;🔍 Debug crashes&#xA;🛡️ Detect malware&#xA;📊 Provide high-level insights&#xA;&#xA;All through a natural chat interface.&#xA;&#xA;https://www.synacktiv.com/en/publications/say-hi-to-pike</description><pubDate>23 Apr 2026 13:09 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mk63hwqiqc2q</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mk5mfzpzls2q</link><description>🚀 Join Synacktiv at #x33fcon for two hands-on trainings (June 8-10):&#xA;&#xA;🔐 Azure Intrusion Tactics (intermediate): www.x33fcon.com#!t/MattheuBa...&#xA;🖥️ Advanced Active Directory Red Teaming (advanced): www.x33fcon.com#!t/WilfriedB...&#xA;&#xA;Sharpen your offensive skills in realistic environments!</description><pubDate>23 Apr 2026 08:39 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mk5mfzpzls2q</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mjz6emk5zk2h</link><description>Attacking heavy applications through named pipes: an attack surface often overlooked due to its complexity.&#xA;&#xA;In this article, @turbothon.bsky.social explains how we designed a tool abusing legitimate processes to attack higly privileged components of heavy clients ⬇️&#xA;https://www.synacktiv.com/en/publications/hooking-windows-named-pipes</description><pubDate>21 Apr 2026 14:18 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mjz6emk5zk2h</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mjjzvc3t3s2n</link><description>We are happy to open-source zom (github.com/synacktiv/zom), a mirror for @zed.dev code editor extensions and releases, useful in restricted environments. Feel free to give it a try, all issues or PRs are welcome!&#xA;https://github.com/synacktiv/zom</description><pubDate>15 Apr 2026 13:47 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mjjzvc3t3s2n</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mjgw3adfak2c</link><description>Double trouble at #SOCON2026! Our ninja @kalimer0x00.bsky.social was busy breaking down Microsoft SCCM (once again!), while @quent0x1.bsky.social unveiled new GPO-based attack paths &amp; his latest Bloodhound contributions targeting OUs &amp; AD Sites. Awesome job! 👏</description><pubDate>14 Apr 2026 08:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mjgw3adfak2c</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mj2dph3fu32z</link><description>Our ninjas identified vulnerabilities in the #BizTalk360 solution. They can be exploited from any authenticated domain user, and lead to full server compromise.&#xA;&#xA;A new version is available, update your instances! &#xA;&#xA;👇&#xA;https://www.synacktiv.com/advisories/remote-code-execution-from-any-domain-account-in-biztalk360</description><pubDate>09 Apr 2026 08:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mj2dph3fu32z</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mi2gm4npnk2m</link><description>Based on the incidents we handled, our observations align with #ANSSI &#39;s 2025 Cyber Threat Landscape:&#xA;🔻 Fewer ransomware attacks&#xA;🔺 More data exfiltrations&#xA;&#xA;💡 Discover the top 3 causes of data breaches in our infographic!&#xA;&#xA;Facing a breach? Contact us: 📩 csirt@synacktiv.com</description><pubDate>27 Mar 2026 15:27 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mi2gm4npnk2m</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mhxpiibvac2m</link><description>Attacks targeting #Kubernetes are surging in 2025 🔎&#xA;&#xA;To tackle this, Synacktiv #CSIRT is launching a series of articles on Kubernetes forensics.&#xA;&#xA;First up: understanding the underlying container technology 👇&#xA;www.synacktiv.com/en/node/1320&#xA;https://www.synacktiv.com/en/node/1320</description><pubDate>26 Mar 2026 13:28 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mhxpiibvac2m</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mhsqxpxh6k2n</link><description>If #RBCD has been thoroughly documented, only a few resources mention the workflow in cross-domain environment.&#xA;In our new blogpost, we dive into the cross-domain and cross-forest RBCD workflows&#xA;&#xA;Read it here 👇&#xA;https://www.synacktiv.com/en/publications/exploring-cross-domain-cross-forest-rbcd</description><pubDate>24 Mar 2026 14:11 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mhsqxpxh6k2n</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mhiwrp6ioc2i</link><description>Deep dive into the provisionning an on-prem low-privileged #LLM stack, with air-gapped networking and GPU-isolation, hardened down to kernel modules.&#xA;&#xA;What could possibly go wrong?&#xA;&#xA;Read the full article here: https://www.synacktiv.com/en/publications/deep-dive-into-the-deployment-of-an-on-premise-low-privileged-llm-server</description><pubDate>20 Mar 2026 16:29 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mhiwrp6ioc2i</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mhfxadz6pk2l</link><description>💡 Raising awareness to improve investigations&#xA;&#xA;User testimonies are invaluable during incidents - but healthy doubt matters too 🔍&#xA;Trust &amp; accountability help organisations better understand and resolve #cyber incidents.&#xA;&#xA;📊 Discover our recommendations ↓&#xA;📩 https://www.synacktiv.com/en/offers/trainings</description><pubDate>19 Mar 2026 11:59 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mhfxadz6pk2l</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mgpkpbqcys2z</link><description>Active #RDP connections can reveal the client hostname 🔎&#xA;A key indicator for investigations &amp; #CTI: some attackers reuse hostnames.&#xA;Traces to check: CLIENTNAME env variable &amp; RDP printer redirection.&#xA;&#xA;🛡️ Incident? Contact #Synacktiv CSIRT 24/7: csirt@synacktiv.com</description><pubDate>10 Mar 2026 14:16 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mgpkpbqcys2z</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mg3ljbjt4k2s</link><description>🔎 Want to know what you can really do with #mitmproxy?&#xA;&#xA;This deep dive shows how to intercept and modify application traffic on #Linux, #Android, and #iOS - from TLS MITM to gRPC/Protobuf tampering.&#xA;&#xA;Read our latest article: https://www.synacktiv.com/en/publications/mitmproxy-for-fun-and-profit-interception-and-analysis-of-application-traffic</description><pubDate>02 Mar 2026 15:37 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mg3ljbjt4k2s</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mfml65sqtk2z</link><description>🚀 Last December, the Synacktiv #WinterChallenge 2025 took place.&#xA;👏 Congratulations to the 25 participants for their outstanding solutions!&#xA;🧠 Read the write-up on the best techniques used to craft a constraint-compliant quinindrome: https://www.synacktiv.com/en/publications/2025-winter-challenge-writeup</description><pubDate>24 Feb 2026 16:21 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mfml65sqtk2z</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3meitrtb55c2l</link><description>#IT evolves… and so do attacks. 🛡️&#xA;&#xA;Sharpen your skills in March-April 2026 with our #cybersecurity courses: Forensic, Cloud, Active Directory &amp; Malware Analysis.&#xA;&#xA;📅 Limited spots: https://www.synacktiv.com/en/offers/trainings</description><pubDate>10 Feb 2026 11:19 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3meitrtb55c2l</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mdv5zrmyts2q</link><description>In our latest article, @niozow.bsky.social dives into the inner workings of #Windows access tokens, privileges and logon rights.&#xA;As these rights often constitute a blind spot for AD enumeration tools, the article describes our PRs to integrate them into BloodHound ⬇️&#xA;https://www.synacktiv.com/en/publications/beyond-acls-mapping-windows-privilege-escalation-paths-with-bloodhound</description><pubDate>02 Feb 2026 15:30 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mdv5zrmyts2q</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mdklgugewc27</link><description>🔍 Synacktiv training courses - April 2026&#xA;&#xA;Hands-on #cybersecurity courses led by #Synacktiv experts: Cloud Forensics (AWS), Azure &amp; AD intrusion tactics.&#xA;📅 March-April | Onsite &amp; Remote&#xA;👉 https://www.synacktiv.com/en/offers/trainings</description><pubDate>29 Jan 2026 10:30 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mdklgugewc27</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mdcyn732w224</link><description>At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller.&#xA;Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit.&#xA;&#xA;🔍 https://www.synacktiv.com/en/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-berlin-2025</description><pubDate>26 Jan 2026 10:05 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mdcyn732w224</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3md3mgilep227</link><description>On the podium at #Pwn2Own Automotive 2026 🥉&#xA;&#xA;Synacktiv ranked 3rd in Tokyo 🇯🇵 after successful attacks on #Tesla Infotainment (USB), #Sony XAV-9500ES (USB) and #Autel MaxiCharger (NFC).&#xA;&#xA;📍 Next stop: Berlin!</description><pubDate>23 Jan 2026 11:38 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3md3mgilep227</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mcjsur26e22z</link><description>Our experts will be at #Pwn2Own Automotive in Tokyo 🇯🇵&#xA;&#xA;After taking 1st place in 2024 by uncovering #Tesla and automotive vulnerabilities, they’re back to explore new attack entry points!&#xA;&#xA;Stay tuned 🔍</description><pubDate>16 Jan 2026 09:45 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mcjsur26e22z</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mcfh4l66n22q</link><description>Cyber threats evolve fast - so should your skills.&#xA;In March, join our hands-on #cybersecurity training covering Linux Forensics, Cloud Forensics (Azure &amp; AWS) and Intrusion Tactics.&#xA;&#xA;⌛ Limited seats → https://www.synacktiv.com/en/offers/trainings&#xA;&#xA;#Cybersecurity #Forensics #CloudSecurity</description><pubDate>14 Jan 2026 16:04 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mcfh4l66n22q</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mcetxldaks2h</link><description>From legacy WEP to WPA3-Enterprise: sharing our recent #WiFi field experiences. 📡&#xA;&#xA;We detail various scenarios to better understand the risks, including WPA3 PEAP relaying &amp; optimized online PSK brute-forcing.&#xA;&#xA;⤵️ https://www.synacktiv.com/en/publications/wireless-infidelity-pentesting-wi-fi-in-2025</description><pubDate>14 Jan 2026 10:22 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mcetxldaks2h</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mb4p6evu4k2l</link><description>🔒 Feb 2026: #cybersecurity training with #Synacktiv!&#xA;&#xA;5&amp;6 Feb: Kubernetes Intrusion Tactics (Paris, FR)&#xA;9&amp;10 Feb: AWS Intrusion Tactics (Paris, FR)&#xA;9-11 Feb: Malware Analysis (Remote, EN)&#xA;16-20 Feb: Attacking Web Apps (Paris, FR)&#xA;&#xA;✅ Register now: https://www.synacktiv.com/en/offers/trainings</description><pubDate>29 Dec 2025 11:09 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mb4p6evu4k2l</guid></item><item><link>https://bsky.app/profile/synacktiv.com/post/3mao6unwj3k2d</link><description>🚨 Pre-Auth RCE in #Livewire (CVE-2025-54068)!&#xA;&#xA;Our specialists uncovered a critical flaw allowing remote code execution without the APP_KEY, exploiting Livewire’s hydration mechanism + PHP’s loose typing.&#xA;&#xA;🔗 Patch now! (v3.6.4+)&#xA;https://www.synacktiv.com/en/publications/livewire-remote-command-execution-through-unmarshaling</description><pubDate>23 Dec 2025 16:40 +0000</pubDate><guid isPermaLink="false">at://did:plc:f66ty74va5ti7faiq5ezuncy/app.bsky.feed.post/3mao6unwj3k2d</guid></item></channel></rss>