Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ ippsec, ippsec ]

Uploaded a video on detecting Responder when it is setup to respond to LLMNR Requests. Nothing fancy, and there are tools that have done this for a long time like Respounder. However, we keep it simple with just powershell and a scheduled task https://t.co/0DOccIhMHF

πŸ”— https://youtu.be/h_cWWL-yyb0

πŸ₯ [ tweet ]
😈 [ _choisec, Sunggwan Choi ]

New blog post:
https://t.co/68Epz4z0ke

poc Github:
https://t.co/fGbKBZjsv4

Blogged about recreating/simulating an MSI payload from the recent ASEC's blog post(https://t.co/g7KSbhg4tj) and @HuskyHacksMK 's blog post(https://t.co/F7T8DoE6ec). Learned MSI payload generation.

πŸ”— https://blog.sunggwanchoi.com/recreating-a-msi-payload-for-fun-and-no-profit/
πŸ”— https://github.com/ChoiSG/GwisinMsi
πŸ”— https://asec.ahnlab.com/en/37483/
πŸ”— https://notes.huskyhacks.dev/notes/ms-interloper-on-the-subject-of-malicious-msis

πŸ₯ [ tweet ]
😈 [ Markak_, Zhenpeng Lin ]

I just released the #DirtyCred version of exploit to CVE-2022-2588 (an 8-year-old bug) along with a brief write-up. Ideally, the exploit could work on different distros if the kernel is vulnerable. Feel free to check it out at https://t.co/IUuvuoLUbX!

πŸ”— https://github.com/Markakd/CVE-2022-2588

πŸ₯ [ tweet ]
😈 [ pdiscoveryio, ProjectDiscovery.io ]

A Guide to DNS Takeovers: The Misunderstood Cousin of Subdomain Takeovers by @pry0cc / @hakluke

https://t.co/E25vgmyCN4

#hackwithautomation #security #bugbounty

πŸ”— https://blog.projectdiscovery.io/guide-to-dns-takeovers/

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

I’m not a big fan of the Cyberpunk 2077 game itself but these new #Edgerunners series are surprisingly very cool and full of the classic β€œhigh tech, low life” spirit 🀀

πŸ₯ [ tweet ]

Ρ€Π΅Π°Π»ΡŒΠ½ΠΎ супСр Ρ‚ΠΎΠΏ, Π·Π°Ρ†Π΅Π½ΠΈΡ‚Π΅
πŸ”₯5
😈 [ LittleJoeTables, Moloch ]

I've collected a few community tutorials/guides/resources for Sliver, feel free to send us more!

https://t.co/FRiBbHpVWa

πŸ”— https://github.com/BishopFox/sliver/wiki/Community-Guides

πŸ₯ [ tweet ]
😈 [ gregdarwin, Greg Darwin ]

Cobalt Strike 4.7.1 is live. This is a patch release to fix an issue with the sleep mask, and a vulnerability in the teamserver. Full details on the blog: https://t.co/Jug1Qg3ede
If you may want to revert back to 4.7 at some point, make a backup of your CS folder before updating.

πŸ”— https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/

πŸ₯ [ tweet ]
😈 [ 0xdf_, 0xdf ]

Really clever unintended solution to StreamIO from @xct_de!

https://t.co/lXQCr5y1D5

πŸ”— https://www.youtube.com/watch?v=3utO6ys2Rhg&t=1130s

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

My kerberoast project titled... kerberoast has been updated and now it's available on PIP and Github.
No new features, the update is necessary to support the new kerberos and auth libraries that the other libraries using
https://t.co/NtuRqt1oV1
Thx @buherator for the headsup

πŸ”— https://github.com/skelsec/kerberoast

πŸ₯ [ tweet ]
😈 [ x86matthew, x86matthew ]

Exploiting a Seagate service to create a SYSTEM shell (CVE-2022-40286)

A brief overview of reverse-engineering a Windows service to discover local privilege escalation exploits.

https://t.co/zKLvaYzryf

πŸ”— https://www.x86matthew.com/view_post?id=windows_seagate_lpe

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Making @ShitSecure’s dream of in-memory #LaZagne come true here πŸ˜… Kudos to @naksyn and his awesome #Pyramid project πŸ”₯🐍

P. S. Also fixed #KeeThief execution within LaZagne for Python 3

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ splinter_code, Antonio Cocomazzi ]

#JuicyPotato is back! πŸ”₯

Get instant SYSTEM access if you have SeImpersonate or SeAssignPrimaryToken privs!

Checkout our new #JuicyPotatoNG πŸ‘‡

https://t.co/mqB9dZ3YCA

cc @decoder_it

πŸ”— https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

CrackMapExec can now export share results in case you are scanning a /24 or /16 πŸ”₯

Thanks to @gray_sec for the PR πŸš€

πŸ₯ [ tweet ][ quote ]
😈 [ ORCx41, ORCA ]

ever wanted to replace FindResource, LoadResource, LockResource, SizeofResource...
well, now you can :
https://t.co/Xl9F56pd4p

πŸ”— https://github.com/ORCx41/ManualRsrcDataFetching

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

Full scenario with CrackMapExec πŸš€

1⃣ get all IP from your domain (using DA)
2⃣ scan all shares with the account of your choice
3⃣ export the results
4⃣ analyse the results
5⃣ call the CISO immediately πŸ˜‚

πŸ₯ [ tweet ][ quote ]
πŸ”₯1
😈 [ mariuszbit, mgeeky | Mariusz Banach ]

🦠If you wish to understand what's causing your AMSI detection - whether VBA or WSH, you might check out Matt Graeber's @mattifestation AMSITools.ps1.

I crafted up HOWTO and a helper script that uses his brilliant work to pull AMSI events:

https://t.co/gOjTGuXUSZ

πŸ”— https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/red-teaming/AMSITools

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― ]

https://t.co/WWoC7jw9Pi

πŸ”— https://github.com/cepxeo/dll4shell

πŸ₯ [ tweet ]