F4b's Avatar

F4b

@0xf4b

VR team tech lead @synacktiv.com

133
Followers
99
Following
1
Posts
22.11.2024
Joined
Posts Following

Latest posts by F4b @0xf4b

Video thumbnail

#IT evolvesโ€ฆ and so do attacks. ๐Ÿ›ก๏ธ

Sharpen your skills in March-April 2026 with our #cybersecurity courses: Forensic, Cloud, Active Directory & Malware Analysis.

๐Ÿ“… Limited spots: www.synacktiv.com/en/offers/tr...

10.02.2026 11:19 ๐Ÿ‘ 1 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025 On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025

At #Pwn2Own Berlin 2025, a full exploit chain against VMware Workstation was demonstrated via a heap overflow in the PVSCSI controller.
Despite Windows 11 LFH mitigations, advanced heap shaping and side-channel techniques enabled a reliable exploit.

๐Ÿ” www.synacktiv.com/en/publicati...

26.01.2026 10:05 ๐Ÿ‘ 6 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image

On the podium at #Pwn2Own Automotive 2026 ๐Ÿฅ‰

Synacktiv ranked 3rd in Tokyo ๐Ÿ‡ฏ๐Ÿ‡ต after successful attacks on #Tesla Infotainment (USB), #Sony XAV-9500ES (USB) and #Autel MaxiCharger (NFC).

๐Ÿ“ Next stop: Berlin!

23.01.2026 11:38 ๐Ÿ‘ 5 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
From Pwn2Own Automotive 2026 Day 1: Synacktiv vs. Tesla
From Pwn2Own Automotive 2026 Day 1: Synacktiv vs. Tesla YouTube video by TrendAI Zero Day Initiative

In a highlight from Day One of #Pwn2Own Automotive 2026, @synacktiv.com targets the #Tesla infotainment system. #P2OAuto
youtube.com/shorts/DKYT-...

22.01.2026 11:16 ๐Ÿ‘ 6 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image

Confirmed! Synacktiv (@synacktiv) chained three vulnerabilities to gain root-level code execution on the Sony XAV-9500ES, earning a full win of $20,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto

21.01.2026 04:47 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025 Wireless-(in)Fidelity: Pentesting Wi-Fi in 2025

From legacy WEP to WPA3-Enterprise: sharing our recent #WiFi field experiences. ๐Ÿ“ก

We detail various scenarios to better understand the risks, including WPA3 PEAP relaying & optimized online PSK brute-forcing.

โคต๏ธ www.synacktiv.com/en/publicati...

14.01.2026 10:22 ๐Ÿ‘ 3 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Video thumbnail

โœจ Happy New Year 2026 โœจ

Everyone at REVELยทIO wishes you a successful year ahead.
As digital investigation challenges continue to grow, we remain committed to contributing to a safer future.

Thank you for your trust!

05.01.2026 13:41 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Exploiting Anno 1404 Exploiting Anno 1404

[New blog post] As part of an R&D project, @tomtombinary.bsky.social identified several critical vulnerabilities in the LAN multiplayer mode of the game Anno 1404 (released in 2009) ๐Ÿ”

Want to know more?
Read the full article on our blog ๐Ÿ‘‡
www.synacktiv.com/en/publicati...

16.12.2025 15:56 ๐Ÿ‘ 3 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
ActivID administrator account takeover : the story behind ActivID administrator account takeover : the story behind

HID recently disclosed HID-PSA-2025-002, a critical flaw in the #ActivID Authentication Appliance 8.7.

In our new blog post, @us3r777.bsky.social and @pierregg.bsky.social break down exactly how they uncovered it, from methodology to exploitation ๐Ÿ’ก

Read it here โฌ‡๏ธ
synacktiv.com/en/publicati...

12.12.2025 15:22 ๐Ÿ‘ 3 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Video thumbnail

Missed @hexacon.bsky.social 2025? ๐Ÿคฏ
Good news, all #Synacktivโ€™s deep-dive talks on offensive research & reverse engineering are now online!

๐ŸŽฅ Watch the full playlist: www.youtube.com/playlist?lis...

#cybersecurity

01.12.2025 15:12 ๐Ÿ‘ 8 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey

At #Pwn2Own2025, our experts Tek & @anyfun.bsky.social remotely compromised a Synology Beestation Plus via a pre-auth exploit, leading to full system takeover.

The vuln is now tracked as CVE-2025-12686 ๐Ÿ”

๐Ÿ”— Full write-up: www.synacktiv.com/en/publicati...

27.11.2025 14:59 ๐Ÿ‘ 4 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Meet our #Synacktiv and @revel-io.bsky.social experts at #Milipol, from Tuesday 18 to Friday 21 November 2025!

๐Ÿ“ Visit us at Stand H063 (Hall 4 โ€“ Forensic Zone).

โ„น๏ธ www.milipol.com/fr-FR

18.11.2025 10:08 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Site Unseen: Enumerating and Attacking Active Directory Sites Site Unseen: Enumerating and Attacking Active Directory Sites

[Blogpost] @croco_byte presents how to exploit attack paths related to Active Directory sites' ACLs.
As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project:

07.11.2025 14:15 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

See you at #MilipolParis 2025 ๐Ÿ‘‹

๐Ÿ“… November 18-21, 2025
๐Ÿ“ Paris Nord Villepinte - Hall 4, Stand H063 (Forensic Zone)

Meet our experts on site and discover how #REVELยทIO improves the efficiency and reliability of digital investigations

๐Ÿ”— www.milipol.com/en

04.11.2025 12:27 ๐Ÿ‘ 5 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

A big shout-out to the #Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork!
They proudly secured third place overall ๐Ÿ‘

Next stop: Tokyo for the upcoming edition ๐Ÿ‡ฏ๐Ÿ‡ต ๐Ÿ‘€

More details on the targets and participants here โ„น๏ธ
www.zerodayinitiative.com/blog/2025/20...

31.10.2025 15:54 ๐Ÿ‘ 3 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

#REVELยทIO will be exhibiting at #MilipolParis 2025 ๐Ÿ“ข

Developed by @synacktiv.com, REVELยทIO is the first French digital forensics solution designed to help investigators.

๐Ÿ“ Hall 4 - Forensic zone - Stand H063
๐Ÿ’ก Learn more about Milipol: www.milipol.com/en
๐Ÿ’ก Discover REVELยทIO: revelio.eu

31.10.2025 08:40 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Another busy month with many technical talks from the team! ๐Ÿ’ช

Links and more details below ๐Ÿ‘‡๏ธ

30.10.2025 16:26 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 6 ๐Ÿ“Œ 0
Preview
Paint it blue: Attacking the bluetooth stack Paint it blue: Attacking the bluetooth stack

Following their presentation at @hexacon.bsky.social, @mtalbi.bsky.social & Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android โฌ‡๏ธ

www.synacktiv.com/en/publicati...

27.10.2025 16:02 ๐Ÿ‘ 6 ๐Ÿ” 5 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

๐ŸŽ‰ Big win at #Pwn2Own Cork!

@pol-y.bsky.social of #Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system ๐Ÿฆˆ๐ŸŽถ

What a way to wrap up the challenge - congrats, @pol-y.bsky.social ๐Ÿ’ช

23.10.2025 12:35 ๐Ÿ‘ 7 ๐Ÿ” 6 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Impressive work from our team today at #Pwn2Own!

@mtalbi.bsky.social and Matthieu just pulled off an exploit on the Philips Hue Bridge without laying a finger on the device!

Great demonstration of Synacktivโ€™s offensive expertise ๐Ÿ‘

Come on ๐Ÿ”ฅ

22.10.2025 15:36 ๐Ÿ‘ 13 ๐Ÿ” 7 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Congrats to tek and anyfun for landing the first successful entry at #Pwn2OwnCork - exploiting a stack overflow on Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process ๐Ÿ’ฅ

Letโ€™s keep pushing ๐Ÿ’ช

#P2OIreland #Synacktiv

21.10.2025 15:32 ๐Ÿ‘ 4 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Quantum readiness: Hybridizing key exchanges Quantum readiness: Hybridizing key exchanges

Our post-quantum cryptography series continues!

This new article by @bluesheeet.bsky.social unpacks the hybridization of key exchanges, covering theory and implementations.

Read all about why it matters, how to approach it safely, and some misconceptions here ๐Ÿ‘‡
www.synacktiv.com/en/publicati...

16.10.2025 14:49 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

LinkPro: new stealthy #Linux rootkit based on eBPF ๐Ÿ”๏ธ

Our #CSIRT team discovered and named LinkPro, a new Linux rootkit, during an incident response. It exploits eBPF for evasion and persistence.
Here are the four key technical points in the image below. ๐Ÿ’ก

๐Ÿ”— www.synacktiv.com/en/publicati...

14.10.2025 14:33 ๐Ÿ‘ 4 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

That's a wrap for Hexacon 2025!

We hope that you've enjoyed the event at least as much as we did ๐Ÿคฉ

Please take a moment to fill out our satisfaction survey and help us make Hexacon 2026 even better ๐Ÿ”ฅ

Thank you for trusting us year after year ๐Ÿ™

13.10.2025 14:38 ๐Ÿ‘ 5 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

๐ŸŽฏ New training session: #ActiveDirectory Intrusion Tactics โ€“ Advanced Level
5 intense days diving into advanced AD intrusion techniques.

Donโ€™t miss our upcoming offensive #cybersecurity courses!
๐Ÿ”— www.synacktiv.com/en/offers/tr...

13.10.2025 12:41 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
LLM Poisoning [1/3] - Reading the Transformer's Thoughts LLM Poisoning [1/3] - Reading the Transformer's Thoughts

LLM Poisoning [1/3]: Local LLMs are vulnerable to supply chain attacks.
Inject a trigger-activated Trojan in a LLM. First step, build a probe to read a transformer's pre-down MLP activations to detect your chosen trojan trigger.

๐Ÿ”— Full article www.synacktiv.com/en/publicati...

08.10.2025 15:52 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

#LesAssises2025, here we go ๐Ÿš€

Come and meet us at ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐—™๐Ÿฎ๐Ÿด to discuss your challenges and find out how we can strengthen your #cyber posture.
Adrien, Augustin and Neder will be on hand to answer all your questions and share their insights.

Seeing you there ๐Ÿค

08.10.2025 10:29 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image

A look back at our ninjas' first day at @hexacon.bsky.social !

We are proud of our experts Quentin and Etienne, who are leading the โ€˜iOS for Security Engineersโ€™ training course.
At the same time, Matthieu and Paul are hard at work on the โ€˜Azure intrusion for red teamersโ€™ training course ๐Ÿš€

07.10.2025 10:49 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

๐Ÿ“ข"Paint it Blue: Attacking the Bluetooth stack" by Mehdi Talbi and Etienne Helluy-Lafont

03.10.2025 15:58 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0