Bienvenue sur le podcast francophone Hack'n Speak ! Notre but est de partager la voix de nos 'hacker' à travers leurs outils / recherches.
Twitter: https://x.com/croco_byteTwitter: https://x.com/mpgn_x64Blog post - https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx- https://www.synacktiv.com/publications/abusing-multicast-poisoning-for-pre-authenticated-kerberos-relay-over-http-with- https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking
Twitter: https://x.com/hugow_vincent Twitter: https://x.com/mpgn_x64 Blog post https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx
Twitter: https://x.com/jmbesnard_maz Twitter: https://x.com/mpgn_x64 Adminer: https://github.com/Mazars-Tech/AD_Miner Bluesky: mpgn
Twitter: https://x.com/_worty Twitter: https://x.com/mpgn_x64 ECSC: https://ecsc.eu/ FCSC: https://cyber.gouv.fr/france-cybersecurity-challenge-2024 HeroCTF: https://x.com/HeroCTF
Twitter : https://x.com/_p0ly_ Twitter: https://x.com/vdehors Twitter: https://x.com/mpgn_x64
Secator: https://github.com/freelabz/secator Twitter: https://x.com/freelabz Twitter: https://x.com/mpgn_x64
Twitter: https://twitter.com/mxrchreborn Twitter: https://twitter.com/mpgn_x64 Ghunt : https://github.com/mxrch/GHunt
Twitter https://twitter.com/sar5430 blog: https://sar5430.github.io/ Twitter https://twitter.com/mpgn_x64 Site de crackme: https://crackmes.one/
Twitter https://twitter.com/nono_nonop Twitter https://twitter.com/mpgn_x64
Twitter fr0gger https://twitter.com/fr0gger_ Twitter https://twitter.com/mpgn_x64 Livre https://store.securitybreak.io/threatintel Unprotect.io https://unprotect.it/https://unprotect.it/
Synacktiv: https://www.synacktiv.com/ mpgn: https://twitter.com/mpgn_x64
ringtail twitter: https://twitter.com/ringtail_sec ringtail site web: https://ringtail.ch/ basilisk: https://ringtail.ch/products/basilisk-zero-automatic-ethernet-ghosting mpgn: https://twitter.com/mpgn_x64 Merci à la société BZHunt pour le prêt du matos https://bzhunt.fr/
Twitter: BitK: https://twitter.com/BitK_ Twitter Sakiir: https://twitter.com/sakiirsecurity Team CTFtime: https://ctftime.org/team/87434 mpgn: https://twitter.com/mpgn_x64
Twitter: https://twitter.com/_zblurx Github: https://github.com/zblurx mpgn: https://twitter.com/mpgn_x64
Twitter Agarri: https://twitter.com/Agarri_FR Formation Burp Suite: https://hackademy.agarri.fr/ Twitter MasteringBurp : https://twitter.com/MasteringBurp Blog Agarri : https://www.agarri.fr/fr mpgn: https://twitter.com/mpgn_x64
palenath : https://twitter.com/palenath Github: https://github.com/megadose/ Site OSINT FR: https://osintfr.com/ Discord OSINT FR: https://discord.gg/dWY9sWFKYD Epios: https://epieos.com/ mpgn: https://twitter.com/mpgn_x64
Blaklis_ : https://twitter.com/Blaklis_ Lien Club Paris Discord: https://discord.gg/MT6D8wP2Hd Profil HackerOne: https://hackerone.com/blaklis?type=user mpgn: https://twitter.com/mpgn_x64
M4Fly: https://twitter.com/M4yFly GOAD: https://github.com/Orange-Cyberdefense/GOAD RCE GLPI: https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/ Arsenal: https://github.com/Orange-Cyberdefense/arsenal Mindmap AD: https://github.com/Orange-Cyberdefense/ocd-mindmaps mpgn: https://twitter.com/mpgn_x64
g0h4n: https://twitter.com/g0h4n_0 RustHound: https://github.com/OPENCYBER-FR/RustHound SharpHound: https://github.com/BloodHoundAD/SharpHound Bloodhound: https://github.com/BloodHoundAD/BloodHound python-bloodhound: https://github.com/fox-it/BloodHound.py mpgn: https://twitter.com/mpgn_x64
lesnuages / rkervell : https://twitter.com/rkervell Moloch : https://twitter.com/LittleJoeTables blogpost sliver : https://dominicbreuker.com/ Sliver: https://github.com/BishopFox/sliver mpgn: https://twitter.com/mpgn_x64
mpgn: https://twitter.com/mpgn_x64 @pentest_swissky : https://twitter.com/pentest_swissky PayloadsAllTheThings https://github.com/swisskyrepo/PayloadsAllTheThings SSRFmap https://github.com/swisskyrepo/SSRFmap
mpgn: https://twitter.com/mpgn_x64 @_ZakSec : https://twitter.com/_ZakSec tool: https://github.com/Z4kSec/Masky blog post: https://z4ksec.github.io/posts/masky-release-v0.0.3/ les coin cme: https://twitter.com/mpgn_x64/status/1537728466933714944?s=20&t=iq62ePRjV31FfNB8uk1x0w
mpgn: https://twitter.com/mpgn_x64 @snyff: https://twitter.com/snyff PentesterLab : https://pentesterlab.com/
mpgn: https://twitter.com/mpgn_x64 @Th3_l5D: https://twitter.com/Th3_l5D NewbieContest: https://www.newbiecontest.org/
mpgn: https://twitter.com/mpgn_x64 @T00uF : https://twitter.com/T00uF github: https://github.com/login-securite/DonPAPI : Dumping revelant information on compromised targets without AV detection recherche @Fist0urs pour Synacktiv https://www.synacktiv.com/ressources/JSSI_2017_DPAPI_Synacktiv.pdf
Solution du lab présenté lors du Workshop CrackMapExec à leHack 2022 par @mpgn_x64
mpgn: https://twitter.com/mpgn_x64 @swapgs: https://twitter.com/swapgs blog: https://swap.gs/
mpgn: https://twitter.com/mpgn_x64 the-useless-one (Yannick): https://github.com/the-useless-one pywerview: https://github.com/the-useless-one/pywerview @lowercase_drm (Simon) https://twitter.com/lowercase_drm Le blog de l'équipe : https://offsec.almond.consulting/
mpgn: https://twitter.com/mpgn_x64 0xLupin: https://twitter.com/0xLupin Classement final: https://twitter.com/Hacker0x01/status/1496962484204408837 Equipe: arsene_lupin adibou kuromatae yanzax neolex sehno 0xbeefed bitk bask hisxo reeverzax victor_pct serizao bzhash gromak123 hach sakiir jtop_fap adolphoramirez 4bg0p TnMch
mpgn: https://twitter.com/mpgn_x64 Qazeer: https://twitter.com/_Qazeer th3m4ks: https://twitter.com/th3m4ks Github: https://github.com/wavestone-cdt/EDRSandblast Misc: https://connect.ed-diamond.com/misc/misc-118/techniques-de-contournement-de-la-supervision-des-edr
mpgn: https://twitter.com/mpgn_x64 laluka: https://twitter.com/TheLaluka Github: https://github.com/laluka/jolokia-exploitation-toolkit Blog: https://thinkloveshare.com/
Liens: mpgn: https://twitter.com/mpgn_x64 podalirius: https://twitter.com/podalirius_/ Github: https://github.com/p0dalirius Blog: https://podalirius.net/en/
Twitter: mpgn: https://twitter.com/mpgn_x64 Amat Cama: https://twitter.com/amatcama fluoroacetate: https://twitter.com/fluoroacetate https://sthack.fr/ https://www.root-me.org/ https://w3challs.com/challenges/list/pwn Vainqueur de la Pwn2Own: pwn2own Tokyo 2018 - Master of Pwn pwn2own Vancouver 2019 - Master of Pwn pwn2own Tokyo 2019 - Master of Pwn pwn2own 2020 COVID - Master of Pwn
Twitter: mpgn: https://twitter.com/mpgn_x64 Shutdown: https://twitter.com/_nwodtuhs Github project: https://github.com/ShutdownRepo/pywhisker https://github.com/ShutdownRepo/targetedKerberoast https://github.com/ShutdownRepo/Exegol https://www.thehacker.recipes/ https://github.com/koutto/pi-pwnbox-rogueap
Twitter: mpgn: https://twitter.com/mpgn_x64 Shutdown: https://twitter.com/_nwodtuhs Github project: https://github.com/ShutdownRepo/pywhisker https://github.com/ShutdownRepo/targetedKerberoast https://github.com/ShutdownRepo/Exegol https://www.thehacker.recipes/ https://github.com/koutto/pi-pwnbox-rogueap
Twitter: mpgn: https://twitter.com/mpgn_x64 cfreal_: https://twitter.com/cfreal_ Github project: PHPGGC: https://github.com/ambionics/phpggc
Twitter: mpgn: https://twitter.com/mpgn_x64 topotam : https://twitter.com/topotam77 Github project: PetitPotam: https://github.com/topotam/PetitPotam
Twitter: mpgn: https://twitter.com/mpgn_x64 gentilkiwi: https://twitter.com/gentilkiwi Github project: Mimikatz: https://github.com/gentilkiwi/mimikatz Kekeo: https://github.com/gentilkiwi/kekeo
Twitter: mpgn: https://twitter.com/mpgn_x64 gentilkiwi: https://twitter.com/gentilkiwi Github project: Mimikatz: https://github.com/gentilkiwi/mimikatz Kekeo: https://github.com/gentilkiwi/kekeo
Twitter: mpgn: https://twitter.com/mpgn_x64 vletoux: https://twitter.com/mysmartlogon Github project: PingCastle: https://github.com/vletoux/pingcastle NULL DACL youtube.com/watch?v=KILnU4FhQbc GidsApplet: https://github.com/vletoux/GidsApplet
Twitter: mpgn: https://twitter.com/mpgn_x64 lgandx: https://twitter.com/PythonResponder Github projects: Responder: https://github.com/lgandx/Responder PCredz: https://github.com/lgandx/PCredz Sponsoring via Patreon: https://www.patreon.com/PythonResponder https://www.paypal.com/paypalme/PythonResponder Blog: https://g-laurent.blogspot.com/ Article Microsoft DHCP INFORM Configuration Overwrite Turning client side to server side ruxcon 2011 Tools évoqué dans le podcast par Laurent: Network Monitor pour SMBv1 Message Analyzer pour SMBv2 Implementing CIFS - The Common Internet FileSystem
Twitter: mpgn: https://twitter.com/mpgn_x64 hisxo : https://twitter.com/adrien_jeanneau Github projects: gitGraber: https://github.com/hisxo/gitGraber
Twitter: mpgn: https://twitter.com/mpgn_x64 hisxo : https://twitter.com/adrien_jeanneau Github projects: gitGraber: https://github.com/hisxo/gitGraber
Twitter: mpgn: https://twitter.com/mpgn_x64 itm4n: https://twitter.com/itm4n Blog: https://itm4n.github.io/ Github projects: PrivescCheck: https://github.com/itm4n/PrivescCheck FullPowers: https://github.com/itm4n/FullPowers PrintSpoofer: https://github.com/itm4n/PrintSpoofer
Twitter: mpgn: https://twitter.com/mpgn_x64 itm4n: https://twitter.com/itm4n Blog: https://itm4n.github.io/ Github projects: PrivescCheck: https://github.com/itm4n/PrivescCheck FullPowers: https://github.com/itm4n/FullPowers PrintSpoofer: https://github.com/itm4n/PrintSpoofer
Twitter: mpgn: https://twitter.com/mpgn_x64 Pixis: https://twitter.com/HackAndDo Github projects: lsassy: https://github.com/Hackndo/lsassy pyGPOAbuse: https://github.com/Hackndo/pyGPOAbuse sprayhound: https://github.com/Hackndo/sprayhound Crackmapexec: https://github.com/byt3bl33d3r/CrackMapExec Impacket: https://github.com/SecureAuthCorp/impacket Prodump module CME: https://gist.github.com/mpgn/414335dc8a91c39fabcbeb693641e57a