Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ x86matthew, x86matthew ]

Exploiting a Seagate service to create a SYSTEM shell (CVE-2022-40286)

A brief overview of reverse-engineering a Windows service to discover local privilege escalation exploits.

https://t.co/zKLvaYzryf

๐Ÿ”— https://www.x86matthew.com/view_post?id=windows_seagate_lpe

๐Ÿฅ [ tweet ]
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

Making @ShitSecureโ€™s dream of in-memory #LaZagne come true here ๐Ÿ˜… Kudos to @naksyn and his awesome #Pyramid project ๐Ÿ”ฅ๐Ÿ

P. S. Also fixed #KeeThief execution within LaZagne for Python 3

๐Ÿฅ [ tweet ]
Forwarded from Offensive Xwitter Eye
๐Ÿ˜ˆ [ splinter_code, Antonio Cocomazzi ]

#JuicyPotato is back! ๐Ÿ”ฅ

Get instant SYSTEM access if you have SeImpersonate or SeAssignPrimaryToken privs!

Checkout our new #JuicyPotatoNG ๐Ÿ‘‡

https://t.co/mqB9dZ3YCA

cc @decoder_it

๐Ÿ”— https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mpgn_x64, mpgn ]

CrackMapExec can now export share results in case you are scanning a /24 or /16 ๐Ÿ”ฅ

Thanks to @gray_sec for the PR ๐Ÿš€

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ ORCx41, ORCA ]

ever wanted to replace FindResource, LoadResource, LockResource, SizeofResource...
well, now you can :
https://t.co/Xl9F56pd4p

๐Ÿ”— https://github.com/ORCx41/ManualRsrcDataFetching

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mpgn_x64, mpgn ]

Full scenario with CrackMapExec ๐Ÿš€

1โƒฃ get all IP from your domain (using DA)
2โƒฃ scan all shares with the account of your choice
3โƒฃ export the results
4โƒฃ analyse the results
5โƒฃ call the CISO immediately ๐Ÿ˜‚

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ mariuszbit, mgeeky | Mariusz Banach ]

๐Ÿฆ If you wish to understand what's causing your AMSI detection - whether VBA or WSH, you might check out Matt Graeber's @mattifestation AMSITools.ps1.

I crafted up HOWTO and a helper script that uses his brilliant work to pull AMSI events:

https://t.co/gOjTGuXUSZ

๐Ÿ”— https://github.com/mgeeky/Penetration-Testing-Tools/tree/master/red-teaming/AMSITools

๐Ÿฅ [ tweet ]
Forwarded from Offensive Xwitter Eye
๐Ÿ˜ˆ [ zux0x3a, Lawrence ๅ‹žๅ€ซๆ–ฏ ]

https://t.co/WWoC7jw9Pi

๐Ÿ”— https://github.com/cepxeo/dll4shell

๐Ÿฅ [ tweet ]
ะะต ะผะพะณัƒ ะฝะต ะฟะพั€ะตะบะพะผะตะฝะดะพะฒะฐั‚ัŒ ะฟะพะดะฟะธัั‹ะฒะฐั‚ัŒัั ะฝะฐ @s0i37_channel, ั‚ะฐะบ ะบะฐะบ ัƒะถะต ะฟั€ะตะดั‡ัƒะฒัั‚ะฒัƒัŽ ะณะพะดะฝะพั‚ัƒ ะพั‚ @s0i37. ะš ัะพะถะฐะปะตะฝะธัŽ, ะผั‹ ะฝะต ะทะฝะฐะบะพะผั‹ ะปะธั‡ะฝะพ, ะฝะพ ะตะณะพ ั€ะฐะฑะพั‚ั‹ ะฒะพัั…ะธั‰ะฐัŽั‚.

ะœะพะต ะปัŽะฑะธะผะพะต โ€“ ัั‚ะพ:
- https://xakep.ru/2020/06/17/windows-mitm/
- https://github.com/s0i37/lateral
๐Ÿ”ฅ4๐Ÿ˜2
๐Ÿ˜ˆ [ Six2dez1, Six2dez ]

This is a superb article for pentesting Cisco networks

https://t.co/spiVfvLyQm

๐Ÿ”— https://medium.com/@in9uz/cisco-nightmare-pentesting-cisco-networks-like-a-devil-f4032eb437b9

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ NationalCyberS1, National Cyber Security Services ]

LinWinPwn:- A bash script that automates a number of Active Directory Enumeration and Vulnerability checks.

Link:https://t.co/pR8suEn8PZ

#hacking #bugbountytips #informationsecurity #cybersecurity #infosec #cybersecuritytips #Ethicalhacking #Pentesting

https://t.co/uJj502OabP

๐Ÿ”— https://github.com/lefayjey/linWinPwn
๐Ÿ”— https://ncybersecurity.com

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ HackerOtter, OtterHacker ]

Muscle up your game with Kerberos. Abuse tickets and Kerberos extensions to elevate your privileges.

I've built a small lab around the S4U2Self Abuse :
https://t.co/8GSnJuLJcf

Find all you need here :
https://t.co/hXkRocpkSX

Thanks @pentest_swissky for the help on ansible !

๐Ÿ”— https://github.com/OtterHacker/LabS4U2Self
๐Ÿ”— https://otterhacker.github.io/Pentest/Services/Kerberos.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ redteamfieldman, RTFM ]

Doing some end of the week research on command and control platforms and ran across a couple great resources. @c2_matrix #C2 #RedTeam
https://t.co/3VPtAFW9sK
https://t.co/SV1nZkJuD7

๐Ÿ”— https://www.thec2matrix.com/matrix
๐Ÿ”— https://github.com/tcostam/awesome-command-control

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ an0n_r0, an0n ]

EVERYTHING about relaying attacks by @vendetce. Just scrolled through the slides (here: https://t.co/c4187R98AQ), still watching the video, awesome content. Thanks for this broad comprehensive presentation! ๐Ÿ‘๐Ÿ‘๐Ÿ‘ https://t.co/MMIgE6xboY

๐Ÿ”— https://www.blackhillsinfosec.com/wp-content/uploads/2022/09/Coercions-and-Relays-The-First-Cred-is-the-Deepest.pdf
๐Ÿ”— https://youtu.be/b0lLxLJKaRs

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ _nwodtuhs, Charlie โ€œShutdownโ€ ]

โœจ The Hacker Recipes presents GoldenGMSA ๐Ÿช™

Shoutout to @Dramelac_ for preparing the recipe and @volker_carstein for initial review and changes.
Shoutout to the awesome work by @SemperisTech and @YuG0rd for the research and tooling

https://t.co/SzTykUrPJw

๐Ÿ”— https://www.thehacker.recipes/ad/persistence/goldengmsa

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ lkarlslund, Lars Karlslund ]

Cool LDAP utility for Red Teamers! Easy to do simple lookups and some modifications - it has great potential and I'm sure more features will come. I had a similar tool planned, but never found the time to do it - fortunately @synzack21 did!
https://t.co/LhOsVPTbV8

๐Ÿ”— https://github.com/Synzack/ldapper

๐Ÿฅ [ tweet ]