Mehdi Talbi
@mtalbi.bsky.social
📤 85
📥 119
📝 4
Messing with Zigbee at Pwn2Own
add a skeleton here at some point
5 days ago
0
1
2
reposted by
Mehdi Talbi
Fabrice Riceputi
3 months ago
2
403
187
reposted by
Mehdi Talbi
buherator
4 months ago
[RSS] On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025
www.synacktiv.com ->
Original->
0
2
1
reposted by
Mehdi Talbi
Synacktiv
4 months ago
Our experts will be at
#Pwn2Own
Automotive in Tokyo 🇯🇵 After taking 1st place in 2024 by uncovering
#Tesla
and automotive vulnerabilities, they’re back to explore new attack entry points! Stay tuned 🔍
loading . . .
0
1
1
reposted by
Mehdi Talbi
0xor0ne
5 months ago
Synology Beestation Plus pre-auth exploitation and full system takeover
www.synacktiv.com/en/publicati...
Write up Arnaud Gatignol and Théo Fauché
#infosec
0
4
2
My
#Hexacon
talk with Etienne on exploiting the Bluetooth stack (fluoride) is now available on YouTube
youtu.be/wYulofbUDqY?...
loading . . .
HEXACON 2025 - Paint it Blue: Attacking the Bluetooth stack by Mehdi Talbi & Etienne Helluy-Lafont
YouTube video by Hexacon
https://youtu.be/wYulofbUDqY?si=gBL97Q2eo1t_3sAq
6 months ago
0
4
2
reposted by
Mehdi Talbi
Synacktiv
6 months ago
A big shout-out to the
#Synacktiv
team for their strong performance at the latest
#Pwn2Own
competition in Cork! They proudly secured third place overall 👏 Next stop: Tokyo for the upcoming edition 🇯🇵 👀 More details on the targets and participants here ℹ️
www.zerodayinitiative.com/blog/2025/20...
0
3
3
reposted by
Mehdi Talbi
Synacktiv
7 months ago
Following their presentation at
@hexacon.bsky.social
,
@mtalbi.bsky.social
& Etienne detail how they exploited CVE-2023-40129, a critical vulnerability affecting the Bluetooth stack in Android ⬇️
www.synacktiv.com/en/publicati...
loading . . .
Paint it blue: Attacking the bluetooth stack
Paint it blue: Attacking the bluetooth stack
https://www.synacktiv.com/en/publications/paint-it-blue-attacking-the-bluetooth-stack
0
6
5
Impressive exploitation strategy!!
bsky.app/profile/thez...
add a skeleton here at some point
7 months ago
0
3
0
reposted by
Mehdi Talbi
TrendAI Zero Day Initiative
7 months ago
Confirmed! David Berard of
@synacktiv.com
used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points.
#Pwn2Own
0
1
2
reposted by
Mehdi Talbi
TrendAI Zero Day Initiative
7 months ago
🎥 Eyes wide shut! David Berard of
@synacktiv.com
just breached the @Ubiquiti AI Pro surveillance system at
#Pwn2Own
. He also serenaded us with round of "Baby Shark" played through the speaker. He's off to the disclosure room with an ear worm and the details.
0
3
4
reposted by
Mehdi Talbi
TrendAI Zero Day Initiative
7 months ago
Confirmed! The team from
@synacktiv.com
used a buffer overflow to exploit the Phillips Hue Bridge. Their unique bug earns them $20,000 and 4 Master of Pwn points.
#Pwn2Own
0
8
4
reposted by
Mehdi Talbi
Synacktiv
7 months ago
Congrats to tek and anyfun for landing the first successful entry at
#Pwn2OwnCork
- exploiting a stack overflow on Synology BeeStation Plus for $40,000 and 4 Master of Pwn points in the process 💥 Let’s keep pushing 💪
#P2OIreland
#Synacktiv
0
4
4
reposted by
Mehdi Talbi
Synacktiv
7 months ago
Impressive work from our team today at
#Pwn2Own
!
@mtalbi.bsky.social
and Matthieu just pulled off an exploit on the Philips Hue Bridge without laying a finger on the device! Great demonstration of Synacktiv’s offensive expertise 👏 Come on 🔥
0
13
7
Exploit inside
#pwn2own
7 months ago
0
3
0
reposted by
Mehdi Talbi
Hexacon
7 months ago
📢"Paint it Blue: Attacking the Bluetooth stack" by Mehdi Talbi and Etienne Helluy-Lafont
0
2
2
reposted by
Mehdi Talbi
Hexacon
8 months ago
Aaaand the first talk to be announced is... 🥁 Exploiting the Undefined: PWNing Firefox by Settling its Promises by Tao Yan & Edouard Bochin
0
5
2
reposted by
Mehdi Talbi
Synacktiv
11 months ago
It's already
#SSTIC2025
day 2!
@remi-j.bsky.social
and us3r present the Windows kernel shadow stack mitigation 🪟
0
9
5
reposted by
Mehdi Talbi
Hexacon
11 months ago
📢 Our Call For Papers is open until 14 July! ➡️ Details & benefits:
www.hexacon.fr/conference/c...
Also, conference tickets will be on sale today at 4PM (UTC+2)
0
2
4
reposted by
Mehdi Talbi
Synacktiv
about 1 year ago
In iOS 18.4, Apple introduced a bug in dynamic symbol resolutions for some specific exports.
@0xf4b.bsky.social
took a long journey down a rabbit hole to understand its root cause.
www.synacktiv.com/en/publicati...
loading . . .
iOS 18.4 - dlsym considered harmful
Observations We first observed the bug in a custom iOS application compiled for the arm64e architecture (thus supporting PAC instructions).
https://www.synacktiv.com/en/publications/ios-184-dlsym-considered-harmful
0
15
9
reposted by
Mehdi Talbi
Phrack Zine
about 1 year ago
Hackers rejoice! We are releasing the Phrack 71 PDF for you today! Don't forget this year is Phrack's 40th anniversary release! Send in your contribution and be part of this historical issue! The CFP is still open, you can find it and the PDF link at
phrack.org
loading . . .
.:: Phrack Magazine ::.
Phrack staff website.
https://phrack.org
2
62
32
reposted by
Mehdi Talbi
Alex Plaskett
over 1 year ago
Ten Years of Rowhammer: A Retrospect (and Path to the Future)
fahrplan.events.ccc.de/congress/202...
From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11
fahrplan.events.ccc.de/congress/202...
loading . . .
Ten Years of Rowhammer: A Retrospect (and Path to the Future) 38C3
The density of memory cells in modern DRAM is so high that disturbance errors, like the Rowhammer effect, have become quite frequent. An attacker can exploit Rowhammer to flip bits in inaccessible mem...
https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/33YLTY/
1
13
7
reposted by
Mehdi Talbi
Phrack Zine
over 1 year ago
We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy!
phrack.org
4
114
61
you reached the end!!
feeds!
log in