<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity conference - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/cybersecurity-conference/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/cybersecurity-conference/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 18 Sep 2025 08:03:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Cybersecurity conference - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/cybersecurity-conference/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Barb’Hack : What to Remember</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/#respond</comments>
		
		<dc:creator><![CDATA[Gauthier Vidal]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 08:03:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[AsRepCatcher]]></category>
		<category><![CDATA[Barbhack]]></category>
		<category><![CDATA[Barbhack 2025]]></category>
		<category><![CDATA[binaires malveillants]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[conférence cybersécurité]]></category>
		<category><![CDATA[cybersecurité]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity conference]]></category>
		<category><![CDATA[Flipper Zero]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Malicious binaries]]></category>
		<category><![CDATA[National Police]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[Purple Team]]></category>
		<category><![CDATA[r2ai]]></category>
		<category><![CDATA[réponse à incident]]></category>
		<category><![CDATA[Responder]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[WebDAV]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=27461</guid>

					<description><![CDATA[<p>Wavestone was present during the 2025 edition of Barb&#8217;hack, a French cybersecurity conference happening yearly in Toulon. You will find below bits and pieces from what we deemed were the most interesting conferences.   Keeping Responder Relevant: The Hidden Potential...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/">Barb’Hack : What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Wavestone was present during the 2025 edition of Barb&#8217;hack, a French cybersecurity conference happening yearly in Toulon. You will find below bits and pieces from what we deemed were the most interesting conferences.</p>
<p> </p>
<h2>Keeping Responder Relevant: The Hidden Potential of Name Resolution Poisoning</h2>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="2"><em>Speaker: Quentin Roland</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="4">Quentin Roland’s talk revisited a set of techniques that are often dismissed as “old-school”: poisoning local name resolution protocols like LLMNR, NBNS, or mDNS. While these attacks are usually thought of as a way to quietly capture SMB authentications, the presentation showed that Windows’ built-in behaviors can turn them into a much more serious threat. In particular, the WebDAV fallback and Kerberos relaying can be combined to turn routine network noise into a pathway for domain compromise.</p>
<div style="text-align: justify;">
<h3> </h3>
<h3>The WebDAV Fallback Trick</h3>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="8">In a typical Windows environment, SMB authentication is everywhere. Poisoning SMB requests with tools like <strong>Responder</strong> can capture credentials, but most of the time these are machine accounts or authentications that can’t be relayed because SMB enforces strict integrity checks. As a result, many captured authentications are effectively useless for attackers.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="10">The talk highlighted an often-overlooked behavior: Windows will sometimes retry failed SMB connections over HTTP using the WebDAV protocol. This happens through the WebClient service, which is installed by default on most machines. The trick lies in how Windows interprets different error codes. By default, when an SMB login fails, the server responds with a “<strong>STATUS_ACCESS_DENIED</strong>” status. Windows stops at that point. But if the server responds with a “<strong>STATUS_LOGON_FAILURE</strong>” instead, the operating system interprets this as a problem with the protocol rather than with the credentials. It retries the connection using WebDAV, effectively transforming an SMB authentication into an HTTP authentication.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="12">This fallback opens a surprising avenue for attackers. HTTP authentications <strong>do not enforce signing by default</strong>, which means they can be relayed to services like LDAP without being blocked by the protections that make SMB less useful. A poisoned SMB request that would otherwise be wasted suddenly becomes a live, relayed authentication that can be used to enumerate Active Directory, spray passwords, or even create new machine accounts.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="14">The main limitation is that the <strong>WebClient service must be running</strong>. While it is installed by default, it isn’t always active unless the user or a process has accessed a WebDAV share. Still, where it is enabled, this fallback represents a subtle but powerful way to pivot within a network.</p>
<div style="text-align: justify;"> </div>
<div style="text-align: justify;"> </div>
<div>
<h3 id="combining-webdav-fallback-with-kerberos-relaying" class="code-line" dir="auto" style="text-align: justify;" data-line="16">Combining WebDAV Fallback with Kerberos Relaying</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="18">The second part of the talk explored how this fallback can be extended to Kerberos, which is particularly relevant in environments where NTLM has been disabled. Kerberos relaying is usually tricky because tickets are bound to specific services. However, by controlling hostname resolution through LLMNR or NBNS, an attacker can trick a client into requesting a Kerberos ticket for any service of their choosing.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="20">With LLMNR poisoning, the attacker is in control of the hostname resolution. By answering with a chosen service name — for example, pointing to an ADCS (Active Directory Certificate Services) instance — the victim generates a Kerberos ticket for that service and sends it straight to the attacker. Using <code>krbrelayx</code>, the attacker can then relay that ticket to ADCS and <strong>request a certificate</strong>. Once a valid certificate is obtained, it can be used to request a TGT, opening the door to full domain compromise.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="22">Now comes the clever part: chaining both ideas together. By combining the WebDAV fallback (responder <code>-E</code> flag) with the Kerberos relaying trick (responder <code>-N</code> flag), SMB traffic can be turned into HTTP WebDAV retries that carry Kerberos tickets. Those tickets can then be relayed directly to ADCS. The attack chain is surprisingly short:</p>
<ol class="code-line" dir="auto" style="text-align: justify;" data-line="24">
<li class="code-line" dir="auto" data-line="24">Victim tries to connect to a nonexistent SMB share.</li>
<li class="code-line" dir="auto" data-line="25">Responder poisons the request, forcing a WebDAV retry.</li>
<li class="code-line" dir="auto" data-line="26">The retry is done over HTTP with Kerberos authentication, using the attacker’s chosen service name.</li>
<li class="code-line" dir="auto" data-line="27">The Kerberos ticket is relayed to ADCS with <code>krbrelayx</code>.</li>
<li class="code-line" dir="auto" data-line="28">ADCS issues a certificate, which the attacker uses to get a TGT.</li>
</ol>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="30">The demo showed exactly this: what started as a harmless SMB lookup ended with a valid certificate and the ability to impersonate domain users.</p>
<p dir="auto" style="text-align: justify;" data-line="30"> </p>
<h3 id="takeaways" class="code-line" dir="auto" style="text-align: justify;" data-line="32">Takeaways</h3>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="34">
<li class="code-line" dir="auto" data-line="34">
<p class="code-line" dir="auto" data-line="34"><strong>Fallbacks matter</strong>: Windows’ WebClient can silently turn SMB into HTTP, bypassing protections meant to stop relaying.</p>
</li>
<li class="code-line" dir="auto" data-line="36">
<p class="code-line" dir="auto" data-line="36"><strong>LLMNR still bites</strong>: Even when NTLM is off, Kerberos tickets can be coerced and relayed if LLMNR is active.</p>
</li>
<li class="code-line" dir="auto" data-line="36">
<p class="code-line" dir="auto" data-line="36"><strong>Defense</strong>: disable the WebClient service, block or disable LLMNR/NBNS, and tighten ADCS protections. Otherwise, attackers can chain these primitives into devastating relays.</p>
</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="40">In conclusion, the presentation demonstrated how Windows’ built-in fallback behaviors and overlooked protocol details can transform seemingly harmless network traffic into a serious threat. SMB authentications that would otherwise be discarded can be converted into relayable HTTP requests, and Kerberos tickets can be redirected to sensitive services to obtain valid certificates. For defenders, the takeaways are straightforward: disabling LLMNR and NBNS, stopping the WebClient service unless necessary, and hardening ADCS certificate issuance policies are key measures. Left unchecked, what appears to be ordinary background traffic on the network can become a pathway to full domain compromise.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="42"><em>Links to the articles:</em></p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="44">
<li class="code-line" dir="auto" data-line="44"><span style="color: #000080;"><a style="color: #000080;" href="https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking#4-implications-regarding-ntlm-relaying" data-href="https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking#4-implications-regarding-ntlm-relaying">Taking the relaying capabilities of multicast poisoning to the next</a></span></li>
</ul>
</div>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Hacking a Metro Ticket</h2>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="50"><em>Speaker : Raphael Attias (rapatt)</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="52">This talk was a dive into something both fun and a bit worrying: how easy it can be to hack metro tickets with a Flipper Zero.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="54">For those not familiar, the Flipper Zero is a pocket-sized multi-tool that can interact with various radio protocols, RFID, NFC, and more. While it can’t read every NFC type, it works with a lot of common ones — including the MiFare Ultralight cards used in many metro systems, festivals, and even hospitals.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="56">The speaker started by walking through the evolution of metro tickets: first punched paper, then magnetic stripes, and now RFID/NFC. In his city, the tickets use MiFare Ultralight, which comes with between 48 and 144 bytes of memory and a 7-byte UID. Pretty small and simple compared to more modern cards.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="58">The key detail: when a ticket is validated at a metro gate, the system simply updates one byte on page 3 of the card to mark it as “used.” That means if you can read and write to that sector, you can basically reset the ticket back to “unused” and ride again. The speaker spent nine months analyzing his card, dumping the data before and after validation, and mapping which bytes controlled what. Eventually, he managed to modify the data in a way that gave him unlimited rides.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="60">It didn’t stop there. He was even able to clone the ticket onto his Flipper Zero, use it directly at metro gates, show it to inspectors, and even recharge it at official machines. All because the system trusted the data stored on the card rather than handling everything server-side.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="62">Of course, the attack has its limits. It depends heavily on the ticketing system — not all cities use MiFare Ultralight, and more advanced implementations would catch this. Also, handling things like transfers and expiration dates requires modifying additional fields, which complicates the hack. Still, in this particular case, the weak design made unlimited metro travel possible.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="64">The fix seems straightforward: keep only the UID on the card and move all ticket logic to the backend. That way, even if someone rolls back or clones their card, the server-side system knows whether it’s valid or not. As of now, though, the city in question hasn’t corrected the issue — meaning free rides are technically still on the table.</p>
<p dir="auto" style="text-align: justify;" data-line="64"> </p>
<div style="text-align: justify;">
<h2>AsRepCatcher &#8211; Make everyone in your VLAN AsRepRoastable</h2>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="53"><em>Speaker: Yassine OUKESSOU</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="55">A new tool called <strong>AsRepCatcher</strong> has been developed by the SOC Team Leader of the <strong>ITrust</strong> team. As the author is required to perform regular internal audits, he is faced with the following problem: <strong>How can a valid domain account be compromised without credentials</strong>?</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="59">Although there are many techniques for gaining initial access, <strong>environments are becoming increasingly secure and remedies are being more and more applied</strong>:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="61">
<li class="code-line" dir="auto" data-line="61">EternalBlue / PrintNightmare / ZeroLogon: <strong>patched machines</strong></li>
<li class="code-line" dir="auto" data-line="62">LLMNR / NBT-NS / mDNS Poisoning: <strong>protocols disabled</strong></li>
<li class="code-line" dir="auto" data-line="63">AsRep Roasting: <strong>pre-authentication enabled by default on all accounts</strong></li>
<li class="code-line" dir="auto" data-line="64">Kerberoasting: <strong>SPNs placed only on service accounts and use of gMSA</strong></li>
<li class="code-line" dir="auto" data-line="65">Network shares: <strong>reading disabled with anonymous or guest accounts</strong></li>
<li class="code-line" dir="auto" data-line="66">Brute force weak passwords: <strong>strong password policy</strong></li>
<li class="code-line" dir="auto" data-line="67">Relays: <strong>signed protocols</strong></li>
<li class="code-line" dir="auto" data-line="68">Phishing: <strong>users made aware</strong></li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="70">Although the list is not exhaustive, it represents the majority of tests performed by an internal auditor.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="72">However, what the author noticed is that <strong>network access is always provided to the auditor</strong>, usually in the area reserved for standard users: <strong>the user VLAN</strong>. In this VLAN, if a user captures the traffic, he will see packets related to authentication, in particular with <strong>NTLM or Kerberos protocols</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="76">It turns out that with the Kerberos protocol, <strong>a derivative of the user&#8217;s password is used (called a hash) to create the KRB_AS_REP request (in the session key).</strong></p>
<p dir="auto" data-line="76"> </p>
<p dir="auto" data-line="76"><img fetchpriority="high" decoding="async" class="wp-image-27488 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-229x191.png" alt="Kerberos authentication explicative scheme" width="664" height="554" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-229x191.png 229w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication-47x39.png 47w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Kerberos-authentication.png 707w" sizes="(max-width: 664px) 100vw, 664px" /></p>
<p dir="auto" data-line="76"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="80">Thus, <strong>an attacker who can retrieve this request could then attempt to crack the user&#8217;s password</strong>. This is exactly what the AsRepCatcher tool attempts to do (hence the name).</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="82">To retrieve the KRB_AS_REP request, the tool uses a well-known technique called <strong>ARP Spoofing</strong>:</p>
<p dir="auto" data-line="82"> </p>
<p dir="auto" data-line="82"><img decoding="async" class="wp-image-27484 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-416x191.png" alt="" width="741" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-416x191.png 416w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack-768x353.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/ARP-Spoofing-Attack.png 925w" sizes="(max-width: 741px) 100vw, 741px" /></p>
<p dir="auto" data-line="82"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="86">An article by <strong>Veracode</strong> explains what ARP spoofing is and how to protect yourself from it: <a href="https://www.veracode.com/security/arp-spoofing/" data-href="https://www.veracode.com/security/arp-spoofing/"><span style="color: #000080;">https://www.veracode.com/security/arp-spoofing/</span></a></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="88">AsRepCatcher modifies the ARP table of legitimate VLAN users, who will now send KRB_AS_REQ requests to the attacker, who can modify them on the fly <strong>by changing the source IP to his own</strong> and also modifying <strong>the encryption algorithms used to create the hash</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="90">This information is important because it allows the attacker to retrieve hashes encrypted with a weak algorithm (in this case <strong>RC4</strong>, provided the KDC authorizes its use), which will greatly facilitate password cracking (a few seconds with RC4 versus several days with AES).</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="92"><strong>The tool also has features to be more quiet on the network</strong>, such as the option (<strong>—disable-spoofing</strong>) to reset the ARP tables of users whose hash has already been captured.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="94">To protect against the tool, it is therefore recommended to implement remedies against ARP Spoofing and not to allow the RC4 encryption algorithm on the domain.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="96"><em>Tool link: <a href="https://github.com/Yaxxine7/ASRepCatcher" data-href="https://github.com/Yaxxine7/ASRepCatcher"><span style="color: #000080;">https://github.com/Yaxxine7/ASRepCatcher</span></a></em></p>
<p dir="auto" style="text-align: justify;" data-line="96"> </p>
<div style="text-align: justify;">
<h2>How does the national police force use OSINT to track down wanted persons?</h2>
</div>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="144"><em>Speaker: Nidhal BEN ALOUI</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="146">Every year, <strong>580,000 people are registered in the Wanted Persons File</strong> (in french: <strong>Fichier des Personnes Recherchés</strong>). Each person has a file containing information about their identity (surname, first name, age, etc.), a photograph, the reason for the search, and the action to be taken if the individual is found.</p>
<p dir="auto" data-line="146"> </p>
<p dir="auto" data-line="146"><img decoding="async" class=" wp-image-27486 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-202x191.png" alt="Fichier des personnes recherchées logo" width="304" height="287" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-202x191.png 202w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo-41x39.png 41w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Fichier-des-personnes-recherchees-logo.png 357w" sizes="(max-width: 304px) 100vw, 304px" /></p>
<p dir="auto" data-line="146"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="150">In order to classify the files more easily, <strong>categories</strong> have been created, including:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="152">
<li class="code-line" dir="auto" data-line="152"><strong>AL</strong>: mentally ill;</li>
<li class="code-line" dir="auto" data-line="153"><strong>IT</strong>: banned from the territory;</li>
<li class="code-line" dir="auto" data-line="154"><strong>M</strong>: runaway minors;</li>
<li class="code-line" dir="auto" data-line="155"><strong>PJ</strong>: judicial police searches;</li>
<li class="code-line" dir="auto" data-line="156"><strong>R</strong>: opposition to residence in France;</li>
<li class="code-line" dir="auto" data-line="157"><strong>S</strong>: state security;</li>
<li class="code-line" dir="auto" data-line="158"><strong>T</strong>: debtor to the Treasury;</li>
<li class="code-line" dir="auto" data-line="159"><strong>V</strong>: escapees;</li>
<li class="code-line" dir="auto" data-line="160"><strong>X</strong>: missing persons</li>
<li class="code-line" dir="auto" data-line="161">etc.</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="163">The French gendarmerie police force is often called upon to search for people on this list as part of investigations. In order to find these individuals, the gendarmerie will then use <strong>a combination of open source intelligence (OSINT) and closed source intelligence</strong>.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="167">For the OSINT part, the use of <strong>social networks, tools, and public websites</strong> is widely favored. A particular attention is paid to the results of public tools, which are never considered certain by the police force. With regard to closed sources, the gendarmerie has <strong>internal tools, databases, and shared national registers</strong> that they can consult during the investigations.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="171">It is also possible for <strong>judicial police officers (OPJ)</strong> to <strong>request access to private information stored by companies</strong> via “derogatory requests”. Or even <strong>to communicate online with potential suspects</strong> via a “pseudonymous investigation.”</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="175">However, <strong>laws very precisely regulate the actions authorized</strong> by the gendarmerie, typically:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="177">
<li class="code-line" dir="auto" data-line="177">Derogatory requests are permitted in the context of <strong>criminal investigations</strong>.</li>
<li class="code-line" dir="auto" data-line="178">Investigations conducted under pseudonyms require a <strong>certification from the Cyber Defense Command</strong> (ComCyber)</li>
<li class="code-line" dir="auto" data-line="179">Each pseudonym and avatar used in the context of an investigation under a pseudonym is <strong>unique and recorded in a list</strong> accessible to all judicial police officers in order to avoid investigating each other</li>
<li class="code-line" dir="auto" data-line="180"><strong>It is not permitted to incite someone to commit a crime</strong> (for example, asking a potential suspect to purchase illegal goods)</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="182">During the conference, two real-life stories were shared to illustrate these concepts.</p>
<p dir="auto" style="text-align: justify;" data-line="182"> </p>
<h2 id="5---purple-team-methodology-and-tooling" class="code-line" dir="auto" style="text-align: justify;" data-line="0">Purple Team: Methodology and tooling</h2>
<p style="text-align: justify;"><em>Speaker: Mael Auzias</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="2">This talk, given by Naval Group, tackled the problem of creating a methodology and tooling in order to perform Purple Teams and include them in a larger audit plan to monitor the evolution of the security level and compare different audited scopes.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="4">Indeed, as a part of the missions an internal audit team have, it is important to have defined audit frameworks in order to properly conduct assignments and compare their different results.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="6">To do so, a member of the Red Team worked with the Blue Team of Naval Group to define a specific framework of testing and results reporting, that will ultimately be used to evaluate the detections and responses of each audited party.</p>
<p dir="auto" style="text-align: justify;" data-line="6"> </p>
<h3 id="purple-team-presentation" class="code-line" dir="auto" style="text-align: justify;" data-line="7">Purple Team presentation</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="8">A Purple Team is an exercise during which Red Team and Blue Team work hand in hand, by freely sharing both malicious actions that are executed and detections made. The ultimate goal being to improve both detection capacities and responses made.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="10">To properly prepare a Purple Team, it is thus important to define:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="11">
<li class="code-line" dir="auto" data-line="11">What kind of attacker profile is to be simulated?</li>
<li class="code-line" dir="auto" data-line="12">What TTPs to focus on during the exercise?</li>
<li class="code-line" dir="auto" data-line="13">What are the targets of the assignment?</li>
<li class="code-line" dir="auto" data-line="14">What are the expected detections and responses?</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="16">Once those points are taken care of, the Purple Team assignment can start.</p>
<p dir="auto" style="text-align: justify;" data-line="16"> </p>
<h3 id="methodology-and-tooling-dedicated-to-the-internal-purple-team-exercises" class="code-line" dir="auto" style="text-align: justify;" data-line="18">Methodology and tooling dedicated to the internal Purple Team exercises</h3>
<h4 id="perform-tests" class="code-line" dir="auto" style="text-align: justify;" data-line="19">Perform tests</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="20">First, the methodology put in place by Naval Group leverages <a href="https://vectr.io/" data-href="https://vectr.io/"><span style="color: #000080;">VECTR</span></a>, a tool destined to automatize testing and measure detection effectiveness by offering a space to both Red and Blue Teams to collaborate. In this case, it is only used as a wrapper to automatically launch specific attacks and collect responses results.</p>
<p dir="auto" data-line="20"> </p>
<h4 id="grading-system" class="code-line" dir="auto" style="text-align: justify;" data-line="21">Grading system</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="22">Once the attacks are performed and the detection are determined, the actions are classified in the following table:</p>
<p dir="auto" data-line="22"> </p>
<figure id="attachment_27482" aria-describedby="caption-attachment-27482" style="width: 753px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-27482" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-437x144.png" alt="Expected/Observed detection rating" width="753" height="248" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table-768x253.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_table.png 1255w" sizes="auto, (max-width: 753px) 100vw, 753px" /><figcaption id="caption-attachment-27482" class="wp-caption-text"><em>Expected/Observed detection rating</em></figcaption></figure>
<p dir="auto" style="text-align: justify;" data-line="22"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="26">Indeed, four cases can be differentiated:</p>
<ul class="code-line" dir="auto" style="text-align: justify;" data-line="27">
<li class="code-line" dir="auto" data-line="27">If an observed detection matches the expected one, the tested malicious action gets the higher rating (here, 7)</li>
<li class="code-line" dir="auto" data-line="28">If an observed detection is &#8220;lower&#8221; than the expected one, it gets a poor rating (between 1 to 3 here)</li>
<li class="code-line" dir="auto" data-line="29">If an observed detection is slightly higher (for example a the initiation of an incident investigation instead of a simple event), it gets a rather high rating (between 5 and 6 here)</li>
<li class="code-line" dir="auto" data-line="30">Finally, if an observed reaction is disproportionate regarding its expected one, it gets a low rating: triggering a global cyber crisis for an action that should not raise an alert can be incapacitating for an information system.</li>
</ul>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="32"><em>PS: here, the different categories do not exactly match the ones that were presented during the event.</em></p>
<p dir="auto" style="text-align: justify;" data-line="32"> </p>
<h4 id="final-grade" class="code-line" dir="auto" style="text-align: justify;" data-line="33">Final grade</h4>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="34">Finally, once every attack categories are tested, a specific math formula computes the final grading of the audited scope in the following graph:</p>
<p dir="auto" style="text-align: center;" data-line="34"> </p>
<figure id="attachment_27480" aria-describedby="caption-attachment-27480" style="width: 449px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-27480" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-253x191.png" alt="Final grading graph" width="449" height="339" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-253x191.png 253w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph-52x39.png 52w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/09/Rating_graph.png 351w" sizes="auto, (max-width: 449px) 100vw, 449px" /><figcaption id="caption-attachment-27480" class="wp-caption-text"><em>Final grading graph</em></figcaption></figure>
<p dir="auto" style="text-align: justify;" data-line="34"> </p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="38">This final grading will allow to deduce the performance of the Blue Team, but also monitor the evolution of this of metric over time.</p>
<p dir="auto" style="text-align: justify;" data-line="38"> </p>
<h3 id="conclusion" class="code-line" dir="auto" style="text-align: justify;" data-line="40">Conclusion</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="41">Thus, by defining a clean audit frame to perform Purple Team, it ensures Naval Group to properly assess the performance of the detections made in the different scopes of the company, compare them and monitor the evolutions over time.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="43">This will assurely be proven efficient the more Purple Team exercise are conducted.</p>
<p dir="auto" style="text-align: justify;" data-line="43"> </p>
<div style="text-align: justify;">
<h2>How malicious actors fool researchers with unpopular software</h2>
<div>
<p class="code-line" dir="auto" data-line="228"><em>Speaker: Georgy Kucherin</em></p>
<p class="code-line" dir="auto" data-line="230">The speaker, a vulnerability researcher at Kaspersky, presents a case study encountered during a real-life mission.</p>
<p class="code-line" dir="auto" data-line="232">As a network analyst working for a client, the researcher was struck by a result collected in the <strong>SIEM</strong>.</p>
<p class="code-line" dir="auto" data-line="234">The domain <a href="http://eventuallogic.com/" data-href="http://eventuallogic.com/"><span style="color: #000080;">eventuallogic.com</span></a> is retrieved and analyzed on the well-known Virus Total platform with a score of <strong>1/97</strong> (meaning that one antivirus program recognizes the domain as suspicious or dangerous, compared to 96 that recognize it as safe).</p>
<p class="code-line" dir="auto" data-line="236">Given the result, many would not have looked any further, but Georgy continued his investigation out of curiosity.</p>
<p class="code-line" dir="auto" data-line="238">Upon visiting the website, <strong>the company appears to offer software for compressing files</strong>. Georgy <strong>downloaded it to a VM and tested it</strong>. The tool works well despite recurring ads.</p>
<p class="code-line" dir="auto" data-line="240">At this point, many researchers would classify the software as <strong>PUA (= Potentially Unwanted Application)</strong>, meaning that the software is not desired on a professional workstation (mainly because of the ads), but is not considered dangerous. However, <strong>only the IT department can decide to ban this type of software</strong>; it is not up to analysts at the <strong>SOC (Security Operation Center)</strong> to decide, unless there is evidence of malicious activity linked to this software.</p>
<p class="code-line" dir="auto" data-line="242">Georgy decides to take some time and analyze this software in more depth, starting with an <strong>online sandbox</strong>: <span style="color: #000080;"><a style="color: #000080;" href="http://joesandbox.com/" data-href="http://joesandbox.com/">joesandbox.com</a>.</span></p>
<p class="code-line" dir="auto" data-line="244">The sandbox then runs the software in a controlled environment and analyzes it. This time, the result is <strong>56/100</strong>, indicating that the software failed certain tests.</p>
<p class="code-line" dir="auto" data-line="246">A file named <strong>decrypt.exe</strong> is found in the computer&#8217;s memory when the software is running. This file is retrieved by Georgy and analyzed on Virus Total, with a score of <strong>5/97</strong>. Still not very high, but in the relationships tab, another domain is present: <span style="color: #000080;"><a style="color: #000080;" href="http://decryptables.com/" data-href="http://decryptables.com/">decryptables.com</a>.</span></p>
<p class="code-line" dir="auto" data-line="248">By repeating this method several times, Georgy traced the file back to another domain offering compression software: Let&#8217;s Compress.</p>
<p class="code-line" dir="auto" data-line="250">The software was analyzed again on joesandbox, and this time Georgy found that the compression software executed <strong>a Python file compiled with pyinstaller</strong>.</p>
<p class="code-line" dir="auto" data-line="252">Georgy performed the following actions:</p>
<ul class="code-line" dir="auto" data-line="254">
<li class="code-line" dir="auto" data-line="254">Extract the content with <strong>pyinstxtractor</strong></li>
<li class="code-line" dir="auto" data-line="255">Convert the main.pyc file into <strong>readable Python script</strong></li>
<li class="code-line" dir="auto" data-line="256"><strong>Deobfuscate</strong> the resulting .py script</li>
<li class="code-line" dir="auto" data-line="257"><strong>Decrypt a .json file</strong> created by the script</li>
<li class="code-line" dir="auto" data-line="258">Find a call to a <strong>Command &amp; Control (C2)</strong> infrastructure in this json file</li>
</ul>
<p class="code-line" dir="auto" data-line="260">After all these investigations, here is proof that <strong>the file is malicious</strong>.</p>
<p class="code-line" dir="auto" data-line="262"><strong>The reverse path</strong> was taken in order to verify the link between the malicious file and the detected base domain.</p>
<p class="code-line" dir="auto" data-line="264">The point of all this is to prove that <strong>malicious actors put in place numerous layers to mislead researchers</strong>, and that even a low score from a widely accepted tool such as Virus Total is not enough to judge the trustworthiness of a binary or domain.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="264"> </p>
<div style="text-align: justify;">
<h2>Decompiling malicious binaries for Linux with r2ai</h2>
<div>
<p class="code-line" dir="auto" data-line="1"><em>Speaker: Axelle Apvrille</em></p>
<p class="code-line" dir="auto" data-line="3">During these days where AI meets cybersecurity more than ever, it was impossible not to have a talk about it. In this talk, Axelle presented <strong>r2ai</strong>, a new plugin for radare2, the well-known reverse engineering framework. The idea is simple yet powerful: combine radare2’s disassembly capabilities with a Large Language Model (LLM) to <strong>translate raw assembly into more intelligible source code</strong>.</p>
<p class="code-line" dir="auto" data-line="5">The talk illustrated the tool’s potential with the analysis of <strong>two real-world malware samples</strong>, showcasing both its strengths and limitations.</p>
<p dir="auto" data-line="5"> </p>
<h3 id="case-study-1-a-tiny-but-crafty-shellcode" class="code-line" dir="auto" data-line="6">Case Study 1: A Tiny but Crafty Shellcode</h3>
<p class="code-line" dir="auto" data-line="8">The first sample was a lightweight <strong>4 KB ELF shellcode</strong>, packed with tricks to frustrate static analysis. Looking for strings inside the data section provided nothing of interest, and even <strong>Ghidra</strong> provided little beyond a cryptic <code>swi</code> instruction.</p>
<p class="code-line" dir="auto" data-line="10">With r2ai, however, the story was different, the disassembly became far more readable. The model pointed out <strong>socket creation</strong> and a suspicious <strong>connect-back routine</strong>. But here came an important caveat: LLMs may &#8220;hallucinate&#8221;. For instance, the model initially suggested a connection to <code>127.0.0.1:4444</code>, which turned out to be incorrect after deeper inspection of the actual assembly.</p>
<p class="code-line" dir="auto" data-line="12">Still, the plugin correctly highlighted another key behavior: a call to <code>mprotect</code> modifying stack memory permissions to <strong>RWX</strong>: a typical indicator of a stager preparing to fetch and execute a payload from a C2 server.</p>
<p class="code-line" dir="auto" data-line="14">In this first case, r2ai showed how it could accelerate the discovery of high-level logic, while human analysts remained essential to validate and correct its interpretation.</p>
<p dir="auto" data-line="14"> </p>
<h3 id="case-study-2-trigona-ransomware-on-linux" class="code-line" dir="auto" data-line="17">Case Study 2: Trigona Ransomware on Linux</h3>
<p class="code-line" dir="auto" data-line="19">The second sample was <strong>Trigona</strong>, a ransomware family usually seen in Windows environments, but with an unexpected <strong>Linux variant</strong> dating back to May 2023. Interestingly, the code was written in <strong>Delphi</strong>—a surprising choice that puzzled many in the audience.</p>
<p class="code-line" dir="auto" data-line="21">Although Trigona was thought to be inactive, <strong>samples were still circulating as of April 2025</strong>, making the analysis particularly relevant.</p>
<p class="code-line" dir="auto" data-line="23">Here, r2ai required extra tuning (increasing the maximum tokens of the model&#8217;s context) to compensate with the binary’s size, but it revealed crucial behaviors:</p>
<ul class="code-line" dir="auto" data-line="24">
<li class="code-line" dir="auto" data-line="24">Shutting down <strong>virtual machines</strong> to maximize disruption,</li>
<li class="code-line" dir="auto" data-line="25">Locating and encrypting documents,</li>
<li class="code-line" dir="auto" data-line="26">Implementing data <strong>exfiltration</strong> before encryption.</li>
</ul>
<p class="code-line" dir="auto" data-line="28">The researchers emphasized how quickly they could map the <strong>entire kill chain</strong>, compared with traditional workflows in IDA Pro or Ghidra.</p>
<p dir="auto" data-line="28"> </p>
<h3 id="limits-and-takeaways" class="code-line" dir="auto" data-line="30">Limits and Takeaways</h3>
<p class="code-line" dir="auto" data-line="31">The presentation ended with a discussion of r2ai’s limitations:</p>
<ul class="code-line" dir="auto" data-line="32">
<li class="code-line" dir="auto" data-line="32"><strong>Token constraints</strong>: long analyses may crash or become expensive,</li>
<li class="code-line" dir="auto" data-line="33"><strong>Accuracy</strong>: while LLMs can explain syscalls and control flow, they sometimes &#8220;invent&#8221; values or logic that analysts must double-check,</li>
<li class="code-line" dir="auto" data-line="34"><strong>Complementary use</strong>: r2ai doesn’t replace standard tools but rather enhances them, accelerating hypothesis-building.</li>
</ul>
<p class="code-line" dir="auto" data-line="36">Still, the experiment showed that coupling an AI model with a disassembler opens new perspectives: <strong>interactive reverse engineering with natural language queries</strong>.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="43"> </p>
<div style="text-align: justify;">
<div>
<div>
<h2>Scanning a network without an IP address, a good idea ?</h2>
<p><em>Speakers: Julien M. &amp; Francis H.</em></p>
<p class="code-line" dir="auto" data-line="49">This presentation, given by Naval Group, introduced a way of scanning a network without displaying its IP address by combining the way of functioning of two basic protocols. Two employees were on stage, one form the Red Team and one from the Blue Team.</p>
<p dir="auto" data-line="49"> </p>
<h3 id="the-protocol-basics" class="code-line" dir="auto" data-line="50">The protocol basics</h3>
<p class="code-line" dir="auto" data-line="51">To understand the following presentation, it is important to go over two famous protocols: ARP (Address Resolution Protocol) and TCP (Transmission Control Protocol).</p>
<h4 id="arp" class="code-line" dir="auto" data-line="52">ARP</h4>
<p class="code-line" dir="auto" data-line="53">ARP is a protocol dedicated to the discovery of assets present in a network, by associating a MAC address and an IP address.</p>
<p class="code-line" dir="auto" data-line="55">To perform this discovery step, broadcast requests are sent to ask for the MAC address corresponding to a specific destination IP address if the latter is not known by the network equipment (for example, a router).</p>
<p dir="auto" data-line="55"> </p>
<h4 id="tcp" class="code-line" dir="auto" data-line="56">TCP</h4>
<p class="code-line" dir="auto" data-line="57">TCP is a communication protocol ensuring reliable, ordered, error-checked data deliver. it relies on SYN requests sent by a source to a destination. Different answers can be expected depending on the accessibility of the destination port:</p>
<ul class="code-line" dir="auto" data-line="58">
<li class="code-line" dir="auto" data-line="58">If the port is filtered, no answer is sent back as the SYN packet does not reach the destination</li>
<li class="code-line" dir="auto" data-line="59">If the port is closed, a RST packet is sent back to the source</li>
<li class="code-line" dir="auto" data-line="60">If the port is opened, a SYN+ACK packet is sent back.</li>
</ul>
<p class="code-line" dir="auto" data-line="62">Another case can be differnciated: if the port is opened but the source disapears of the network (for example after a network shortage), the SYN+ACK packet is sent several times (for example, 5 for some equipment) by the destination in order to continue the TCP exchange.</p>
<p dir="auto" data-line="62"> </p>
<h3 id="gathering-arp-and-tcp-and-maths" class="code-line" dir="auto" data-line="64">Gathering ARP and TCP (and maths)</h3>
<p class="code-line" dir="auto" data-line="65">Thus, a new methodology of scanning emerges of the combination of the way of functionning of ARP and TCP.</p>
<p class="code-line" dir="auto" data-line="67">The goal is to craft a specific SYN packet, by forging the source address to chose an IP address that is not currently in use in the network, and send it to the victim on the chosen port. Following the response of the destination, and since the source IP adress is unknown by the router, the latter will send ARP broadcast requests to find the source. Furthermore, the number of ARP requests will depend on the state of the port:</p>
<ul class="code-line" dir="auto" data-line="68">
<li class="code-line" dir="auto" data-line="68">If the port is filtered, there will be no response sent by the destination, and thus no ARP broadcast request</li>
<li class="code-line" dir="auto" data-line="69">If the port is closed, there will be one RST packet sent by the destination to the unknown source, and thus one ARP broadcast request</li>
<li class="code-line" dir="auto" data-line="70">If the port is opened, there will be several SYN+ACK packets as there won&#8217;t be ACK packets sent back by the unknown source, thus several ARP broadcast requests</li>
</ul>
<p class="code-line" dir="auto" data-line="72">The attacker will just have to monitor the number of ARP broadcast requests related to the impersonated unknown IP address to deduce the state for the scanned port.</p>
<p class="code-line" dir="auto" data-line="74">However, some limitations exist: for example, the fact that the number of SYN+ACK packets vary may induce a number of false positive, and makes it more difficult to develop reliable tools.</p>
<p dir="auto" data-line="74"> </p>
<h3 id="what-does-the-soc-have-to-say" class="code-line" dir="auto" data-line="76">What does the SOC have to say?</h3>
<p class="code-line" dir="auto" data-line="77">Following the presentation of this methodology, the member of the Blue Team explained the point of view of the SOC regarding this scanning technique.</p>
<p class="code-line" dir="auto" data-line="79">First, it is important to say that while this scanning technique is quite difficult to detect in real life scenarios, it is only one way out of many to scan a network, which thus represents a tiny fraction of scanning scenario (regarding a MITRE ATT&amp;CK matrix) a SOC has to cover.</p>
<p class="code-line" dir="auto" data-line="81">Additionally, this scanning scenario only happens when the network has first been breached, and is not the end of the killchain as well. The Blue Team has several other defense mechanisms to stop attacks either upstream or downstream of this malicious action.</p>
<p dir="auto" data-line="81"> </p>
<h3 id="conclusion-1" class="code-line" dir="auto" data-line="83">Conclusion</h3>
<p class="code-line" dir="auto" data-line="84">Thus, even if this scanning method is quite ingenious, the Blue Teams may not be forced to take it into account and spend time resolving the issue. This conclusion may be even generalized to other future findings: a Blue Team must chose its battle, regarding the severity of the attack techniques and the manpower at disposal.</p>
</div>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="84"> </p>
<div style="text-align: justify;">
<h2>A Tale of Two Reports: The Trivial Things We&#8217;re Told vs. The Vital Things We&#8217;re Not</h2>
<div>
<div>
<div>
<p class="code-line" dir="auto" data-line="69"><em>Speaker: Koreth</em></p>
<p class="code-line" dir="auto" data-line="71">This talk was all about a problem everyone in security knows too well: we’re buried under alerts, notifications, and reports — but the truly important ones are often the first to be missed.</p>
<p class="code-line" dir="auto" data-line="73">Silent Ghost kicked things off with some well-known examples. Take the Target breach: 70 million credit cards leaked, and the warning was there, but it looked too much like spam, so nobody acted. Same story in Rouen (2019), where a phishing email dropped malware that spread laterally across the network. The initial alert was flagged, but ignored. Colonial Pipeline in 2021? Again, a notification existed — but nobody paid attention.</p>
<p class="code-line" dir="auto" data-line="75">And this isn’t a new issue. Back in 2016, the NSA lost sensitive data because an employee simply used a USB stick to exfiltrate it. SolarWinds in 2019 showed how dangerous a compromised CICD pipeline could be, yet very few people noticed the early signs. More recently, Kiabi (2024) faced a €100 million fraud from an internal accountant — red flags were there, but lost in the noise.</p>
<p class="code-line" dir="auto" data-line="77">The structural issue is clear: only 0.13% of pull requests are labeled “security,” while closer to 15% actually involve security. That gap means real vulnerabilities are hidden in plain sight. Silent Ghost pointed out one CVE that took more than 100 undocumented fixes before it was officially recognized.</p>
<p class="code-line" dir="auto" data-line="79">Bug bounty programs suffer the same fate. Running private programs at YesWeHack, he sees inboxes flooded with overblown or poorly written reports: emails describing “CVSS 10” vulnerabilities that turn out to be nothing more than a misconfigured header or an exposed Google Maps API key. The sheer volume of this noise risks burying the handful of truly critical findings.</p>
<p class="code-line" dir="auto" data-line="81">The takeaway was clear: as an industry, we need to cut the noise. Fewer useless notifications, better triage, and clearer reporting standards would help ensure the important alerts get through. Otherwise, the next major breach alert will end up ignored just like the last.</p>
</div>
<div> </div>
</div>
</div>
</div>
<div style="text-align: justify;"> </div>
<div style="text-align: justify;">
<div>
<h2>OASIS &#8211; Ollama Automated Security Intelligence Scanner</h2>
<p class="code-line" dir="auto" data-line="40"><em>Speaker: psyray (Raynald Coupé)</em></p>
<p class="code-line" dir="auto" data-line="42">Another presentation around the usage of AI in the cybersecurity was held about <strong>OASIS</strong>, an open-source framework designed to analyze source code with the help of AI models, with an accent on <strong>confidentiality</strong>.</p>
<p class="code-line" dir="auto" data-line="44">Its creator developed the tool out of necessity: traditional SaaS-based AI solutions raise concerns when working on sensitive client code, making <strong>local deployment a must</strong>.</p>
<p class="code-line" dir="auto" data-line="46">As its name implies, OASIS relies on <strong>Ollama</strong>, a lightweight system that allows developers to run large language models on their own infrastructure. The result is a practical solution for secure, scalable, and customizable code audits.</p>
<p dir="auto" data-line="46"> </p>
<h3 id="architecture-and-workflow" class="code-line" dir="auto" data-line="48">Architecture and Workflow</h3>
<p class="code-line" dir="auto" data-line="49">At a technical level, OASIS relies on a <strong>semantic embedding system</strong>: source code is transformed into vectors, enabling contextual analysis beyond simple pattern matching. This foundation allows the AI to spot vulnerabilities in a way that resembles human reasoning. The tool offers multiple modes of operation</p>
<ul class="code-line" dir="auto" data-line="51">
<li class="code-line" dir="auto" data-line="51"><strong>Audit Mode</strong>: A quick scan to flag high-risk areas in large codebases. By tuning thresholds, analysts can minimize false positives while still obtaining a strong first-pass overview,</li>
<li class="code-line" dir="auto" data-line="52"><strong>Standard Scan</strong> (two-phase):
<ol class="code-line" dir="auto" data-line="53">
<li class="code-line" dir="auto" data-line="53">A <strong>lightweight model</strong> highlights potentially suspicious code,</li>
<li class="code-line" dir="auto" data-line="54">A <strong>more powerful model</strong> performs deep analysis of the flagged sections. This is ideal for large projects with consistent risk profiles.</li>
</ol>
</li>
<li class="code-line" dir="auto" data-line="55"><strong>Adaptive Scan</strong> (multi-level):
<ol class="code-line" dir="auto" data-line="56">
<li class="code-line" dir="auto" data-line="56">A <strong>static scan</strong> with patterns and regex (fast and without AI),</li>
<li class="code-line" dir="auto" data-line="57">A <strong>lightweight model</strong> scans for surface issues,</li>
<li class="code-line" dir="auto" data-line="58">A <strong>contextual analysis</strong> with risk scoring,</li>
<li class="code-line" dir="auto" data-line="59">An <strong>in-depth review</strong> using a heavyweight model,</li>
<li class="code-line" dir="auto" data-line="60">This tiered approach ensures flexibility: from a quick audit to a comprehensive deep dive.</li>
</ol>
</li>
</ul>
<p> </p>
<h3 id="detection-capabilities" class="code-line" dir="auto" data-line="62">Detection Capabilities</h3>
<p class="code-line" dir="auto" data-line="63">OASIS is designed to catch a wide range of issues, including</p>
<ul class="code-line" dir="auto" data-line="64">
<li class="code-line" dir="auto" data-line="64"><strong>Web vulnerabilities</strong>: XSS, XXE, CSRF,</li>
<li class="code-line" dir="auto" data-line="65"><strong>Authentication flaws</strong>,</li>
<li class="code-line" dir="auto" data-line="66"><strong>Sensitive data exposure</strong>,</li>
<li class="code-line" dir="auto" data-line="67"><strong>Configuration errors</strong> such as path traversal or weak cryptographic suites.</li>
</ul>
<p class="code-line" dir="auto" data-line="69">The framework supports <strong>multiple programming languages</strong> and can even generate <strong>Burp Suite requests</strong> to validate findings.</p>
<p dir="auto" data-line="69"> </p>
<h3 id="reporting-and-outputs" class="code-line" dir="auto" data-line="71">Reporting and Outputs</h3>
<p class="code-line" dir="auto" data-line="72">Beyond detection, OASIS generates structured reports in <strong>PDF, Markdown, or HTML</strong>, documenting:</p>
<ul class="code-line" dir="auto" data-line="73">
<li class="code-line" dir="auto" data-line="73">The complete <strong>attack chain</strong> for each vulnerability (entry point, exploitation path, potential impact),</li>
<li class="code-line" dir="auto" data-line="74"><strong>Remediation recommendations</strong>, helping developers fix issues quickly.</li>
</ul>
<p class="code-line" dir="auto" data-line="76">This makes the reports usable both for technical teams and for managers needing a higher-level view of project risk.</p>
</div>
</div>
<p dir="auto" style="text-align: justify;" data-line="76"> </p>
<h2 dir="auto" style="text-align: justify;" data-line="76">Post-Incident Lessons from an Industrial Cyber Breach</h2>
<p style="text-align: justify;"><em>Speakers: Hack’im et Antxine</em></p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="90">This talk was given by two speakers regarding a post-incident feedback.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="92">Indeed, one of their client contacted them after plugging in an USB flash drive on a standard workstation where an EDR triggered an alert. It was suspicious in that case because this flash drive did not raise alerts before, and was only used to update a standalone server separated form the rest of the network.</p>
<p dir="auto" style="text-align: justify;" data-line="92"> </p>
<h3 id="beginning-of-the-investigation" class="code-line" dir="auto" style="text-align: justify;" data-line="94">Beginning of the investigation</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="95">Thus, the focus was made on the server, likely to be infected by a malicious program which propagated to the flash drive.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="97">Using classic tools to retrieve the 900GB of the server and analyze the filesystem and evtx files, they discovered a hidden suspicious program in the <code>%APPDATA%</code> folder called <code>aL4N.exe</code>. Indeed, an unkown executable such as this one should not be in this folder, raising the interest of the investigators.</p>
<p dir="auto" style="text-align: justify;" data-line="97"> </p>
<h3 id="al4nexe" class="code-line" dir="auto" style="text-align: justify;" data-line="99">aL4N.exe</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="100">Using VirusTotal to evaluate the dangerousness of the executable, it showed a detection index of 52/94, being concerning and then driving the investigators to continue their assessment in this direction.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="102">Following this lead, they discovered that this malwere has been present on the server from the mastering of the latter, back in 2016, and was brought up by a flash drive.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="104">Traces of earlier in-house investigations were found, with a file mentionning the presence of <code>aL4N.exe</code> found by employees.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="107">Written in AutoIT, this malware establishes a communication tunnel to a C2 (Command &amp; Control) server. However, in the case of this malware, when configured, the malicious actor set the remote server address to <code>localhost</code>, denoting a lack of knowledge from the initiator of the attack.</p>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="109">The replication system of this malware is however less classic. As soon as an external storage of more of 1GB is attached to an infected target, <code>aL4N.exe</code> will create a <code>My Pictures</code> folder and hide it, copy itself in it and create a shortcut for <code>My Pictures</code> that will execute <code>aL4N.exe</code> upon clicking.</p>
<p dir="auto" style="text-align: justify;" data-line="109"> </p>
<h3 id="conclusion-2" class="code-line" dir="auto" style="text-align: justify;" data-line="111">Conclusion</h3>
<p class="code-line" dir="auto" style="text-align: justify;" data-line="112">The main takeout of this talk is to install detection mechanisms on every components of an IS, even if they are separated for the main network. It is also possible to put in place efficient detection and cleaning stations for flash drives to sanitize removable storage devices, even if the ones of this company did not detecte <code>aL4N.exe</code>.</p>






<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/">Barb’Hack : What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/09/barbhack-what-to-remember/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LeHack 2025: What to Remember</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/#respond</comments>
		
		<dc:creator><![CDATA[Benjamin Garo]]></dc:creator>
		<pubDate>Wed, 30 Jul 2025 05:55:51 +0000</pubDate>
				<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[AD]]></category>
		<category><![CDATA[APT]]></category>
		<category><![CDATA[Browser Cache Smuggling]]></category>
		<category><![CDATA[Climate change]]></category>
		<category><![CDATA[Conference]]></category>
		<category><![CDATA[Conference France]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity conference]]></category>
		<category><![CDATA[Cybersecurity conference France]]></category>
		<category><![CDATA[DCOM turns 20]]></category>
		<category><![CDATA[environmental industrial infrastructures]]></category>
		<category><![CDATA[environmental warfare]]></category>
		<category><![CDATA[GPO parser]]></category>
		<category><![CDATA[Le Hack]]></category>
		<category><![CDATA[Le Hack 2025]]></category>
		<category><![CDATA[Le Hack France 2025]]></category>
		<category><![CDATA[LeHack]]></category>
		<category><![CDATA[LeHack 2025]]></category>
		<category><![CDATA[YoloSw4g]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26829</guid>

					<description><![CDATA[<p>LeHack is one of the oldest and most well-known security conventions in France. It took place from June 26th to June 29th, 2025. The technical presentations held throughout the convention provided an opportunity to explore some of the current cybersecurity...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/">LeHack 2025: What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">LeHack is one of the oldest and most well-known security conventions in France. It took place from June 26<sup>th</sup> to June 29<sup>th</sup>, 2025. The technical presentations held throughout the convention provided an opportunity to explore some of the current cybersecurity challenges. This article reviews four notable conferences that provided practical insights into contemporary attack vectors and defensive strategies: Synacktiv&#8217;s GPO parser research, the evolution of DCOM-based threats, emerging browser cache smuggling techniques, and the focus of APTs on vital environmental industrial infrastructures. </p>
<p style="text-align: justify;">The event also featured a CTF competition running from Saturday night to Sunday morning, where <strong>our team YoloSw4g secured 6th place among 120 participating teams</strong>.  </p>
<p style="text-align: justify;"> </p>
<figure id="attachment_26831" aria-describedby="caption-attachment-26831" style="width: 397px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-26831" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1-345x191.png" alt="Scoreboard Le Hack 2025" width="397" height="220" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1-345x191.png 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Scoreboard-1.png 414w" sizes="auto, (max-width: 397px) 100vw, 397px" /><figcaption id="caption-attachment-26831" class="wp-caption-text"><em>Scoreboard Le Hack 2025</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The following technical analyses focus on the key takeaways from each presentation, emphasizing practical implications for security professionals. </p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">GPO parser (Synacktiv) </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker: Wilfried Bécard</em></p>
<p style="text-align: justify;">Synacktiv’s offensive security team introduced a new open-source tool designed to simplify a task that’s both important and often frustrating when dealing with Active Directory compromises: analyzing Group Policy Objects (GPOs). </p>
<p style="text-align: justify;">GPOs are a key mechanism used by organizations to manage configurations across their Windows environments. They can enforce security policies, run scripts, install software, and more, often without users even realizing it. From an attacker’s perspective, understanding how these policies are set up can provide valuable insight into where to escalate privileges or how to move laterally. But going through GPOs manually to spot those opportunities is time-consuming and not always straightforward. </p>
<p style="text-align: justify;">Synacktiv’s tool takes things a step further than what’s currently out there for parsing GPOs. While many tools focus on who can apply which policies (by looking at access control lists (ACLs) and linked objects) this one digs into what the policies actually <em>do</em>. It pulls out useful details like which users or groups are being added, what scripts are being run, or which software gets pushed to machines. That deeper look can uncover more complex paths an attacker might take to move through a network, especially ones that aren’t visible when you&#8217;re just looking at ACLs. </p>
<p style="text-align: justify;">The tool also integrates smoothly with BloodHound. By feeding it richer GPO data, BloodHound can show privilege escalation routes that might not show up with simpler analysis. That means defenders, red teamers, and anyone working in AD environments get a clearer picture of how an attacker might chain together GPO behavior to gain access or move around. </p>
<p style="text-align: justify;">Synacktiv plans to release the tool soon on <span style="color: #333399;"><a style="color: #333399;" href="https://github.com/synacktiv">their GitHub</a>.</span> Whether you’re securing a domain or testing one, it’s definitely worth keeping an eye on. </p>
<p style="text-align: justify;">  </p>
<h2 style="text-align: justify;">DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker: Julien Bedel</em></p>
<h3 style="text-align: justify;">DCOM Architecture </h3>
<p style="text-align: justify;">The &#8220;DCOM Turns 20&#8221; conference presented a technical analysis of the <strong>evolving threats</strong> related to Component Object Model (COM) and its distributed version (DCOM). Throughout the years, COM has established itself as<strong> a central element </strong>of the Windows ecosystem by enabling <strong>interoperability </strong>between applications through <strong>unique identifiers</strong> (GUID and ProgID). This design facilitates interactions between programs of different languages (i.e. C++, VBS, PowerShell &#8230;) but now represents a considerable attack surface with<strong> over 30,000 interfaces </strong>available on a single Windows 11 workstation.  </p>
<p style="text-align: justify;">This functional richness offers attackers multiple initial access possibilities, ranging from command execution to file downloading, making restriction of access to COM classes technically impossible without compromising system stability. </p>
<p style="text-align: justify;">Organizations must therefore rely on compensating controls such as AppLocker policies to restrict executable paths and EDR solutions to detect suspicious COM-based activities. </p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Persistence Techniques and Lateral Movement </h3>
<p style="text-align: justify;">Attackers can inject specific registry keys into HKCU (taking priority over HKLM) to <strong>redirect </strong>COM calls to malicious DLLs. This method requires a sophisticated approach:<strong> proxying legitimate functions </strong>of the original DLL and targeting specific processes (office applications, browsers, VPN clients, EDR solutions) that remain active during the session and communicate regularly with external networks. For lateral movement, DCOM uses <strong>AppIDs </strong>to identify groups of COM classes accessible remotely. </p>
<p style="text-align: justify;">The accessibility of port 135 (RPC) signals DCOM availability, enabling the use of tools like <strong>DcomExec</strong> for remote command execution, particularly through Excel and Office suite interfaces. </p>
<p style="text-align: justify;">Defense against these lateral movement techniques requires implementing network firewalls to restrict RPC traffic, deploying IDS/IPS solutions to monitor suspicious DCOM communications, and establishing proper network segmentation to limit attackers&#8217; ability to pivot across systems. </p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Privilege Escalation and Bypasses </h3>
<p style="text-align: justify;">The conference demonstrated how DCOM serves as the underlying foundation for many widely used privilege escalation techniques. A significant portion of these exploits are commonly known as &#8220;Potato&#8221; attacks. These techniques have proliferated because Microsoft does not consider them as constituting a breach of security boundaries, leading to the development of multiple variants over time, despite occasional patches being released to address specific implementations.  </p>
<p style="text-align: justify;">The presentation further illustrated how DCOM interfaces serve as a versatile exploitation platform, enabling attackers to achieve diverse objectives through various Windows-specific techniques, from NTLM relay attacks against RDP users to UAC bypass mechanisms, highlighting the breadth of attack vectors available within Microsoft&#8217;s DCOM architecture. </p>
<p style="text-align: justify;">To counter these threats, organizations must implement a defense in depth strategy encompassing protocol signing, NTLM disabling and the use of security solutions such as EDR, IDS or IPS. </p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Browser Cache Smuggling: the return of the dropper </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker : Aurélien Chalot</em></p>
<p style="text-align: justify;">The “Browser Cache Smuggling: the return of the dropper” conference presented a different approach to malware delivery and execution during a Red Team assignment. Today, the analysis of attachments in mailboxes is increasingly monitored by security tools. This is an innovative way of delivering a payload to a victim&#8217;s machine. Two interesting ideas have been highlighted: </p>
<ul style="text-align: justify;">
<li>Browsers are caching web files to reduce the bandwidth meaning that the files have to be downloaded into victim’s machine </li>
</ul>
<ul style="text-align: justify;">
<li>Well-known software’s such as Teams can still suffer from DLL Load Order hijacking   </li>
</ul>
<p style="text-align: justify;">Basically, the attack path relies on the fact that a victim will be tricked into visiting a website controlled by an attacker and where an object with a malicious payload is set up into the HTML page. As browser’s only caches certain file based on the mime-type, the attackers must force the Content-Type of the delivered file to a cacheable value such as image/jpeg. The payload will be then silently downloaded into a temporary folder into the victim’s machine and this file is readable and writable by the current user on the system.  </p>
<p style="text-align: justify;">When the payload is delivered, the attacker needs a way to execute it. The second part of the conference explained how trusted software can be used to hide code and traffic. The example of a certain version of Microsoft Teams has been used to demonstrate how DLL proxying can be used to achieve such executions discreetly. When Teams is executed, the software will try to load multiple DLLs following the Windows Search Order. As some DLL are missing, it will finally search into the current folder where Team’s is installed. As this folder is readable and writable by the current user, then the attacker can force a user to move the malicious payload (i.e the malicious DLL) from the browser cache folder into the Teams folder.  </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em><span style="text-decoration: underline;">Limits of this attack: </span></em></p>
<ul style="text-align: justify;">
<li>The cache folder will be scanned by an EDR (and not only Microsoft Defender on the article) and the temporary file could be quarantined with alerts. </li>
</ul>
<ul style="text-align: justify;">
<li>The moving of the payload from the cache folder to the vulnerable software folder relies on social engineering and doesn’t provide a 0-click compromise path.  </li>
</ul>
<ul style="text-align: justify;">
<li>Firefox is not the default browser used by companies nowadays and Google Chrome or Microsoft Edge use more advanced storage mechanisms for cached files. </li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><em>Countermeasures: </em></span></p>
<ul style="text-align: justify;">
<li>Set a purge a regular purge of the cached files into the browser configuration </li>
</ul>
<ul style="text-align: justify;">
<li>Ensure that EDR/AV scans temporary files  </li>
</ul>
<ul style="text-align: justify;">
<li>Restrict the modification of the temporary folder of the browser by a normal user </li>
</ul>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em><span style="text-decoration: underline;">Links to the articles:  </span></em></p>
<ul style="text-align: justify;">
<li><span style="color: #333399;"><a style="color: #333399;" href="_wp_link_placeholder" data-wplink-edit="true">https://blog.whiteflag.io/blog/browser-cache-smuggling/ </a></span></li>
</ul>
<ul style="text-align: justify;">
<li><span style="color: #333399;"><a style="color: #333399;" href="https://blog.whiteflag.io/blog/brower-cache-smuggling-the-return-of-the-dropper/">https://blog.whiteflag.io/blog/brower-cache-smuggling-the-return-of-the-dropper/</a> </span></li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">When climate change benefits to APTs </h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><em>Speaker: Cybelle Oliveira</em></p>
<p style="text-align: justify;">Cybelle Oliveira presented a conference on the evolution of several APTs observed during the last few years: the specialization of a dozen APTs groups now engaged in an “environmental warfare”. These APTs now target vital environmental industrial infrastructures (water treatment, power grids, carbon capture labs, etc.), especially those protecting populations from climate change effects. To quote numbers given during the conference, a steep rise of 340% in malicious activity targeting climate infrastructure has been noted between 2022 and 2025. In 89% percents of these attacks, populations were physically impacted. </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">So why change targets from private companies to climate infrastructures? One of the main answers is climate change. Attackers seem to have perfectly understood its challenges and turned them into opportunities. Indeed, weaponization of extreme temperatures and availability of infrastructures helping populations to deal with changing climate become powerful extorsion arguments as the impacts may affect the population of whole regions. How would a state react if hundreds of thousands of its citizens were to be deprived of heat during winter or ventilation during ever hotter summers? </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">This growing trend is reinforced by the lack of preparation of said industries to face advanced cyber threats. It is well known that industrial information systems do not have the same lifecycles as classic IT: the need for availability results in heavy delays for updates and systems are often used for more than a decade. Consequently, the obsolescence of equipment and protocols used in OT environments makes them easy targets for attackers. In particular, Modbus protocol, a historical OT communication protocol without security features (authentication, integrity checks, etc.), is still widely spread across networks, even though new secure protocols such as OPC-UA have emerged since. Worse, thousands of these Modbus ports can easily be found open over the Internet, creating entry points right within industrial networks. This denotes the lack of inventory and cartography of vital climate infrastructures, preventing Blue Teams from efficiently identifying the attack surface and securing it. </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In conclusion, climate change and its effects should now be accounted for in CTI to better anticipate risk periods and new menaces as attackers already plan their actions based on these criteria. In addition, helping industry securing climate infrastructures becomes a priority to protect populations as well as secure climate action globally. </p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/">LeHack 2025: What to Remember</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/07/lehack-2025-what-to-remember/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
