TOOLS
- Cisco ACS Repo Decrypt, decrypt Cisco ACS repository passwords
- des26 SAP ITS Decrypt, decrypt des26 SAP ITS (Internet Transaction Server) passwords
- VanDyke SecureCRT Decrypt, decrypt SSH passwords stored in VanDyke SecureCRT session files
- Ethercomm, PoC to reactivate the TCP/32764 backdoor
- SAP SecStore Decrypt, SAP SecStore decryption
- Dissipe, Sage ERP X3 internal passwords decryption
- InYourFace, JSF ViewState tampering
- jimmix, remote administration tool for JBoss AS using the JMXInvoker
- passe-partout, in memory extraction of RSA/DSA keys
- rdp2tcp, TCP tunneling over RDP
- BlueBerry, BlackBerry Enterprise Server passwords decryption
PUBLICATIONS
2015
2014
- G-Jacking AppEngine-based applications, NoSuchCon, Nicolas Collignon
- Advanced password breaking (FR), JSSI Rouen conference, Julien Legras
- NoSuchCon 2014 challenge, Eloi Vanderbeken and Nicolas Collignon
- Bypassing IDS/IPS with the TCP Fast Open option – proof-of-concept, Rump session SSTIC 2014, Nicolas Collignon and Renaud Dubourguais
- G-Jacking AppEngine-based Applications, HITB Amsterdam, Nicolas Collignon and Samir Megueddem
- Writeup for dosfun4u (idc), Defcon CTF quals 2014, Eloi Vanderbeken
- Reverse engineering of the Sercomm feature to reactivate the TCP/32764 backdoor on several routers, Eloi Vanderbeken
- Tools and techniques for Red-Team penetration tests, JSSI OSSIR, Renaud Feil
- Arbitrary code execution to escape the Google App Engine Python sandbox, Nicolas Collignon
- Cross-Site Scripting in the Converse.js XMPP/Jabber client, Renaud Dubourguais
- Discovery and patching of a Remote Code Execution in the WP-Filebase plugin, Samir Megueddem
- Discovery of a backdoor on Linksys routers, Eloi Vanderbeken
- Breaking passwords, BADGE ESIEA, Renaud Feil
2013
- OWASP ESAPI library HMAC validation bypass – proof-of-concept code, Renaud Dubourguais and Renaud Feil
- JSF ViewState upside-down, Renaud Dubourguais and Nicolas Collignon
- Oracle TNS protocol hijacking, SSTIC, Nicolas Collignon
- Pentesting JBoss AS in 2013, MISC n°67 (May/June 2013), Renaud Dubourguais
- CVE-2012-5611: MySQL DBMS memory exploitation, MISC n°67 (May/June 2013), Samir Megueddem
- WAF contest – video, JSSI OSSIR, Renaud Dubourguais and Renaud Feil
- J2EE frameworks security: the birth of Expression Language injections, JSSI Rouen, Renaud Dubourguais
2012
2011
- Pentests: exposing real world attacks, Security Day, Renaud Dubourguais
- Discovery and patching of SQL injections in the WordPress wp-polls plugin, Renaud Feil
- Publication of RDP protocol vulnerabilities, Nicolas Collignon
- Unpacking tips and tricks, MISC magazine HS 7, Eloi Vanderbeken
- Control-flow flattening and symbolic execution, SSTIC conference, Eloi Vanderbeken
- Generating and using memory dumps, RSSIL conference, Eloi Vanderbeken
- Hackito Ergo Sum Crackme, Hackito Ergo Sum conference, Eloi Vanderbeken
2010
- TCP tunneling over RDP, SSTIC, Nicolas Collignon
- Exploiting and securing JBoss AS, SSTIC, Renaud Dubourguais
- Feedback on enterprise applications security, NetFocus, Nicolas Collignon
- In memory extraction of SSL keys, HSC tips, Nicolas Collignon
- Forensic and Software (Un)obfuscation, ECIW conference, Eloi Vanderbeken
2009
2008
- VMware and virtualization security, OSSIR, Nicolas Collignon
- Penetration testing Windows systems, Télécom Bretagne, Renaud Feil
- Penetration testing web applications, Télécom ParisTech, Renaud Feil
2007
- Evolution of Cross Site Request Forgery attacks, Journal In Computer Virology, Renaud Feil
- Discovering IPv6 networks, SSTIC, Nicolas Collignon
- Feedback on PHP code audits, Forum PHP, Nicolas Collignon
- Web 2.0: more ergonomic… and less secure?, JSSI OSSIR, Renaud Feil
- Encrypting hostile web content over HTTP, SSTIC, Renaud Feil
- Evolution of CSRF attacks, SSTIC, Renaud Feil
- Keyloggers : from XP to Vista, MISC, Renaud Feil
- Detecting compromised systems, SolutionsLinux, Nicolas Collignon
2006
2002
from: http://synacktiv.com/en/resources.html