Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ netero_1010, Chris Au ]

Having some fun to re-implement indirect syscall in C#.
https://t.co/7E0Ebk0Uub

πŸ”— https://www.netero1010-securitylab.com/evasion/indirect-syscall-in-csharp

πŸ₯ [ tweet ]
😈 [ TrimarcSecurity, Trimarc ]

If you happened to miss our webinar back in June on 10 Ways to Secure AD Quickly, @JimSycurity wrote you a whitepaper on how to do the very things we talked about. He's a champion.

It's available for download right now:
https://t.co/3wPehRbWP5

πŸ”— https://www.hub.trimarcsecurity.com/post/ten-ways-to-improve-ad-security-quickly

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ gentilkiwi, πŸ₯ Benjamin Delpy ]

Always fabulous to see editors low the Windows Security level

When Citrix SSO is enabled... passwords are stored in *user processes* (in addition to system ones)

Ho yeah, *even if you have Credential Guard*
Yeah, that's what Citrix is calling "SSO"

> Will be in #mimikatz 3 πŸ₯

πŸ₯ [ tweet ]
😈 [ TrustedSec, TrustedSec ]

Does crack[.]sh being offline got you down? πŸ˜” Don't worry, you have options.
Find out how @n00py1 uses two different techniques to exploit systems that allow for the NTLMv1 authentication protocol.

https://t.co/eMqdnbZHLP

πŸ”— https://hubs.la/Q01mpY-j0

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

Python. Asyncio. SSH. Client. (library)
Don't use it if you need security, use it when you want to test security :)
Public, MIT license.
As usual, thank you for all supporters of @porchetta_ind

https://t.co/hc6izOo6Xd

πŸ”— https://github.com/skelsec/amurex

πŸ₯ [ tweet ]
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― ]

Imagine you are 18 years old and accidentally putting your life and future on the edge just because you want to hack/show fame !? For what? Being a criminal is not a smart move, and in the end, you will be caught.

πŸ₯ [ tweet ]

true
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Being on a vacation I couldn’t resist from playing with a slightly modified example of internal credential phishing by @zux0x3a (which is not as complex as the CredentialPhisher from @foxit). Below is a quick demo of invoking a credential dialog with CME, DInjector and donut 🍩

πŸ”— https://github.com/0xsp-SRD/0xsp.com/tree/main/creds_hunt

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ 0xdf_, 0xdf ]

Streamio retires from @hackthebox_eu. A Windows box with MSSQL injection in a PHP site, local and remote file includes, and LAPS.

https://t.co/dE4dFy3n9F

πŸ”— https://0xdf.gitlab.io/2022/09/17/htb-streamio.html

πŸ₯ [ tweet ]
😈 [ ippsec, ippsec ]

#HackTheBox StreamIO video is live, this box has an excellent primer on manually enumerating MSSQL Databases after a successful inject. There’s a lot more to the box than that like active director and LAPS.
https://t.co/of1Puv1EBR

πŸ”— https://youtu.be/qKcUKlwoGw8

πŸ₯ [ tweet ]
🀯1
😈 [ theluemmel, S4U2LuemmelSec ]

Not sure if ADCS ESC 3 is abusable, because Certify and Certipy only give info on the 1st prerequisit "Certificate Request Agent"?

Use ldapfilter
(&(objectclass=pkicertificatetemplate)(msPKI-RA-Application-Policies=1.3.6.1.4.1.311.20.2.1)(pkiextendedkeyusage=1.3.6.1.5.5.7.3.2))'

πŸ₯ [ tweet ]
😈 [ doc_guard, DOCGuard - Detect Maldocs in Seconds! ]

Strange PPT maldoc with low detection rates since 2022-02-02.

MD5: c0060c0741833af67121390922c44f91

PPT file>wscript.exe>powershell.exe>rundll32.exe

[+]Exec wscript when user moves mouse
[+]Wscript exec powershell
[+]PS download the XORed DLL.
[+]Exec it using rundll32.exe

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ lkarlslund, Lars Karlslund ]

Stuck on a network with no credentials? No worry, you can anonymously bruteforce Active Directory controllers for usernames over LDAP Pings (cLDAP) using my new tool - with parallelization I get 10K usernames/sec
https://t.co/ETeKR4OVFP

πŸ”— https://github.com/lkarlslund/ldapnomnom

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ splinter_code, Antonio Cocomazzi ]

After more than 2 years, RunasCs got a big update! πŸ₯³

Biggest changes:
- NetworkCleartext (8) default logon type
- UAC bypass (when admin pass is known)

Enjoy :D

https://t.co/WgAH4qpbZ6

πŸ”— https://github.com/antonioCoco/RunasCs/releases/tag/v1.4

πŸ₯ [ tweet ]
😈 [ mrd0x, mr.d0x ]

Stealing Access Tokens From Office Desktop Applications

https://t.co/12bMrugfe9

πŸ”— https://mrd0x.com/stealing-tokens-from-office-applications/

πŸ₯ [ tweet ]
😈 [ cube0x0, Cube0x0 ]

A new blog post about relaying YubiKeys is up and tools have been uploaded to GitHub!
This would not have been possible without the previous work of @_EthicalChaos_ so big thanks to him
https://t.co/zfEV7RUAV5

πŸ”— https://cube0x0.github.io/Relaying-YubiKeys/

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

Here is why NetNTLMv1 should be disabled in prod networks ASAP. Besides cracking the hash back to NTLM (and then forging Silver Tickets) is straightforward, there is also a lesser known but immediate relay attack path by removing the MIC and doing RBCD abuse. Demo in screenshots.

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye