Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ aetsu, π•¬π–Šπ–™π–˜π–š ]

β€˜GIFShell’ β€” Covert Attack Chain and C2 Utilizing Microsoft Teams GIFs -> https://t.co/6nx18oZmIk

πŸ”— https://link.medium.com/xJDuMH0watb

πŸ₯ [ tweet ]
😈 [ splinter_code, Antonio Cocomazzi ]

We are releasing an alternative way for elevating to SYSTEM when you have SeTcbPrivilege

How?
Leveraging AcquireCredentialsHandle through an SSPI hook that allows authenticating as SYSTEM to SCM

Should be "lighter" than the classic S4U

cc @decoder_it

https://t.co/IQiMXoKIP7

πŸ”— https://gist.github.com/antonioCoco/19563adef860614b56d010d92e67d178

πŸ₯ [ tweet ]
😈 [ BlWasp_, BlackWasp ]

Just updated my ADCS cheatsheet with the new ESC9 & 10 attacks, and a refactor of the page : https://t.co/Ey8wayKWUz

Additionally, I have added these ESC to The Hacker Recipes of @_nwodtuhs with more explains on this page : https://t.co/vvbFhvLVaj

πŸ”— https://hideandsec.sh/books/cheatsheets-82c/page/active-directory-certificate-services
πŸ”— https://www.thehacker.recipes/ad/movement/ad-cs/certificate-templates

πŸ₯ [ tweet ]
😈 [ ippsec, ippsec ]

HTB Scanned video is up! I haven't seen anything like this box. It's a Malware Sandbox Platform - Tou can exfil data by via syscalls. User requires escaping a chroot jail. This enables you to manipulate the jail and exploit a race for root by creating libs https://t.co/d2gFiC1aCt

πŸ”— https://youtu.be/FoQuNsCyQz0

πŸ₯ [ tweet ]
😈 [ 0xdf_, 0xdf ]

Scanned from @hackthebox_eu was really hard. It's a clinic in Linux system exploitation where details matter, and once I learned how all of it worked, the box is a work of art. It's all about abusing a chroot jail through some slight misconfigurations.
https://t.co/NWnJKcyUoa

πŸ”— https://0xdf.gitlab.io/2022/09/10/htb-scanned.html

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

You can now dump only enabled users/computers or a specific user/computer when running ntds option on CrackMapExec πŸš€

Because yeah, sometime dumping can take a very very long time while you only want the krbtgt hash to forge golden ticket πŸ˜…

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ daem0nc0re, daem0nc0re ]

Added my implementation of Ghostly Hollowing and WMI execution.
The PoC for WMI process execution supports not only local machine process but also remote machine process.
It can use NTLM authentication and Kerberos authentication.
https://t.co/z49sc9DYFw
https://t.co/Dukz9j9jmU

πŸ”— https://github.com/daem0nc0re/TangledWinExec/tree/main/WmiSpawn
πŸ”— https://github.com/daem0nc0re/TangledWinExec/commit/7eecbc25f1a636c357373faa5639d8a3136f4403

πŸ₯ [ tweet ]
😈 [ Alh4zr3d, Alh4zr3d ]

Red Teamers: Signed code tends to be scrutinized less. Sign your code with a fake cert: https://t.co/8MZ8pkuv4s. Or, clone the cert from a valid DLL for sneaker DLL hijacking: https://t.co/S4wn2X0to1. Caution with this against ATP, though: Microsoft knows its own certs. #redteam

πŸ”— https://github.com/Tylous/Limelighter
πŸ”— https://github.com/jfmaes/Invoke-DLLClone

πŸ₯ [ tweet ]
😈 [ ippsec, ippsec ]

Just uploaded a video showing off the Sensitive Commands Token Canary Token https://t.co/V1C0IU6X2N - It's a pretty simple video but I really wanted to talk about the phrase "So much offense in my defense" from this blog post: https://t.co/H83n0HnTQi

πŸ”— https://youtu.be/xFlH3DV0J7I
πŸ”— https://blog.thinkst.com/2022/09/sensitive-command-token-so-much-offense.html

πŸ₯ [ tweet ]
😈 [ SEKTOR7net, SEKTOR7 Institute ]

If you happen to click on non-existing Microsoft KB link, do not despair, @betaarchive's got your back.

Huge repository containing old and recent KB articles and lots of other good info.

Check it out!

https://t.co/To0dcuqUYx

πŸ”— https://www.betaarchive.com/wiki/index.php?title=Microsoft_KB_Archive

πŸ₯ [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

πŸ”¬A new, FREE PMAT section is now available on my blog!

It attempts to answer a common question that I get about the PMAT Host Only lab set up and offers steps to configure an Internal Network malware analysis network

You spoke, I listened β™₯

https://t.co/XKdwWmlRn2

πŸ”— https://notes.huskyhacks.dev/blog/malware-analysis-labs-internal-network-vs-host-only

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

Let's have some fun with MSSQL in GOAD this time 😁
https://t.co/x7exgnliAS

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part7/

πŸ₯ [ tweet ]
😈 [ C5pider, 5pider ]

Talon
A (demo) 3rd party agent for the Havoc Framework.
https://t.co/BGmHOXkSCD

πŸ”— https://github.com/HavocFramework/Talon

πŸ₯ [ tweet ]
😈 [ SEKTOR7net, SEKTOR7 Institute ]

Here we go!

Pre-sale of RTO: MalDev Advanced (Vol.1) is now open
Pre-sale end: Sep 27th
Course release date: Sep 28th

Userland rootkit tech, building MSVC COFFs, custom "RPC" instrumentation and more...

You can't miss it!
https://t.co/nEYFgyS0pE

#RTO #redteam #onlinelearning

πŸ”— https://institute.sektor7.net/rto-maldev-adv1

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye