Center of expertise in cybersecurity CESTI & PASSI

Comprehensive technical and organizational support for your cybersecurity projects

Technical safety audits

Audits are one of the cornerstones of cybersecurity and one of our daily activities.

PASSI qualified audits

ACCEIS is qualified as an Information Systems Security Audit Provider by ANSSI. A guarantee of our technical excellence and the professionalism of our methodologies.

Red Team Audit

The Red Team aims to achieve its objectives, using various techniques validated with the client (logical or physical intrusion, social engineering, phishing, etc.).

Safety governance

We help your CISOs and CIOs to implement a comprehensive security management approach within your company. For efficient and effective use of your information system.

ISMS implementation

Bringing your ISMS to life means taking action, monitoring and adapting to change. Organization is key, and we can help you with that.

Risk & compliance

We support you in assessing threats and detecting vulnerabilities to guarantee information security and protect your organization’s sensitive data.

A Breton imprint

ACCEIS is a recognized player at regional level in Brittany, then nationally with a branch in Paris.

A native cybersecurity center of expertise, rooted from the outset in the Breton ecosystem, the cradle of cybersecurity in France.

Based in Rennes and Paris (rue de Rennes), we work all over France with major private and public economic players.

A Breton creation

ACCEIS is a recognized regional and national player in the cybersecurity community. By flying the Breton flag, we’re further anchoring our values of excellence, passion, sincerity and proximity, and showing our origins loud and clear.

Cybersecurity Bretagne Rennes Paris

Partners and sponsors of cybersecurity events

From Paris to Rennes, we’re on the cyber scene, so come and join us at our events!

They testify for ACCEIS!

Your content goes here. Edit or remove this text inline or in the Content settings module. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

eBPF program creation in practice – PID concealment (Part 1)

This article is a tutorial on how to create an eBPF program using a tracepoint. If you're not familiar with eBPF, you can refer to our introduction to eBPF, or to the official documentation What is a tracepoint? How do I create one with eBPF? What are the steps...

eBPF par la pratique – Dissimulation d’un PID (Partie 1)

Cet article est un tutoriel pour réaliser un programme eBPF en utilisant un tracepoint. Si vous n'êtes pas familié avec l'eBPF, vous pouvez vous référer à notre introduction à l'eBPF, ou à la documentation officiel Qu'est-ce qu'un tracepoint ? Comment le créer avec...

Introduction to eBPF

Are you familiar with eBPF ? Do you know its purpose or how it works ? Today, I'm trying to outline a brief overview of what, for me, is a revolutionary and very promising technology for the future of computing. eBPF is a revolutionary technology with origins in the...

Introduction à l’eBPF

Connaissez-vous l'eBPF ? Son utilité ou son fonctionnement ? Aujourd'hui, j'essaie pour vous d'esquisser une ébauche succincte de ce qui est, pour moi, une technologie révolutionnaire et très prometteuse pour le futur de l'informatique. eBPF est une technologie...

Vol de code de hachage NTLM v2 via la vulnérabilité Outlook (CVE-2023-35636)

Introduction Varonis Threat Labs a découvert une nouvelle vulnérabilité Outlook (CVE-2023-35636) parmi trois nouvelles façons d'accéder aux codes de hachage NTLM v2 en exploitant Outlook, Windows Performance Analyzer (WPA) et Windows File Explorer. Avec l'accès à ces...

Theft of NTLM v2 hash code via Outlook vulnerability (CVE-2023-35636)

Introduction Varonis Threat Labs has discovered a new Outlook vulnerability (CVE-2023-35636) among three new ways to access NTLM v2 hash codes by exploiting Outlook, Windows Performance Analyzer (WPA) and Windows File Explorer. With access to these hash codes,...

Tackling PXE images

In this article, we'll demystify the nuts and bolts of PXE boot, and explain how to retrieve and analyze a PXE image to find secrets (such as an AD domain account). Note: This article is also available in french 🇫🇷. What is PXE? 🔍 In computing,...

S’attaquer aux images PXE

Dans cet article, nous allons démystifier les rouages de l'amorçage PXE et expliquer comment récupérer et analyser une image PXE afin d'y trouver des secrets (par exemple un compte du domaine AD). Note : Cet article est aussi disponible en anglais 🇬🇧....

LDAP pass back attack

This article describes the methodology for Active Directory domain accounts takeover through LDAP pass back attack on printers. Note: This article is also available in french 🇫🇷. Goal 🥅 In the context of an internal infrastructure penetration...

Attaque par rétro-passage LDAP

Cet article va détailler la méthodologie permettant l’obtention de compte du domaine Active Directory par attaque de rétro-passage LDAP sur des imprimantes. Note : Cet article est aussi disponible en anglais 🇬🇧. Objectif 🥅 Dans le contexte d’un...