Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ KlezVirus, d3adc0de ]

[Video] The 4th episode of my series about Inceptor is out: "Empowering Donut with Direct and Indirect Syscalls".

In this video, we'll show how it is possible to improve the donut loader by intergating it with SW3.

https://t.co/xNK4HNz9qS

๐Ÿ”— https://youtu.be/ypX7N4498xE

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ippsec, ippsec ]

Starting to play more with Elastic, so just published a video installing v8 it on Ubuntu 22. Really impressed with Fleet so far, the last time I played with Elastic it was a PITA keeping all the agent configs in sync. Fleet's auto update of agents is magic https://t.co/fbQkWgbJKW

๐Ÿ”— https://www.youtube.com/watch?v=Ts-ofIVRMo4

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ dec0ne, Mor Davidovich ]

Introducing ShadowSpray, it's like password spray but with shadow credentials. More info in the repo.
Huge thanks to @elad_shamir for the amazing technique and to @harmj0y (and others) for the implementation in Rubeus from which a lot of code was taken.

https://t.co/nIsnmaitfw

๐Ÿ”— https://github.com/Dec0ne/ShadowSpray/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ cnotin, Clรฉment Notin ]

AdminSDHolder also has a useful SACL, with this ACE allowing to log many actions performed on privileged objects it is applied to.
It's a lesser known feature!

๐Ÿฅ [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
ะ”ะพะฒะพะปัŒะฝะพ ะธะฝั‚ะตั€ะตัะฝะฐั ัั‚ะฐั‚ัŒั, ะบะฐะบ ะพะฑั…ะพะดะธั‚ัŒ EDR ั ะฟะพะผะพั‰ัŒัŽ python)))

https://www.naksyn.com/edr%20evasion/2022/09/01/operating-into-EDRs-blindspot.html

#redteam #pentest #bypass
๐Ÿ˜ˆ [ n00py1, n00py ]

Web vulns you should look for on an internal pentest: XXE.

We often think of XXE as a way to read local files, but you can also use it to coerce auth. HTTP NTLM does not request signing so you can easily relay it to LDAP. Web service accounts are often over permissioned.

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ HackerGautam, Frooti ]

Not only crawling but you can do Subdomain Enumeration using Wayback.

โฌ‡๏ธ
curl --insecure --silent "http://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u

#bugbounty #hacking #infosec

๐Ÿฅ [ tweet ]
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

This is how easter eggs are found ๐Ÿ˜… @_nwodtuhs @podalirius_

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ ORCx41, ORCA ]

decided to release this, a highly capable pe packer, with a lot of nice features
https://t.co/iedhKbTlzm

๐Ÿ”— https://github.com/ORCx41/AtomPePacker

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ g0h4n_0, g0h4n ]

Today I share with you #RustHound๐Ÿฆ€. A new AD collector written in #Rust for #BloodHound!
It is cross-platform, cross-compiled and generates all json files needed.

Other modules will be available as under development!๐Ÿ”ฅ

Hope you will enjoy it!

https://t.co/bxjCVyocfv https://t.co/8jEcSuEdEj

๐Ÿ”— https://github.com/OPENCYBER-FR/RustHound

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ FortaliceLLC, Fortalice Solutions ]

NTLM Relaying to SCCM for the win ๐Ÿ‘€๐Ÿ‘€๐Ÿ‘€ Fortalice's @Tw1sm just added SCCM support to NtlmRelayX. Check out the PR at: https://t.co/hWfNeiuqxp

๐Ÿ”— https://github.com/SecureAuthCorp/impacket/pull/1425

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mpgn_x64, mpgn ]

New update on CrackMapExec ๐Ÿ”ฝ

โžก๏ธ Upload/download with MSSQL -guervild
โžก๏ธ Exploit KeePass (discover, trigger) @d3lb3_ ๐Ÿ”ฅ
โžก๏ธ ACL read with LDAP @BlWasp_
โžก๏ธ Check ntlmv1 (postex) @Tw1sm
โžก๏ธ Check alwayselevated (postex) -bogey3
โžก๏ธ Improved export on cmedb @gray_sec

๐Ÿช‚

๐Ÿฅ [ tweet ]
Forwarded from Offensive Xwitter Eye
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

Based on @dec0neโ€™s work on ShadowSpray Iโ€™ve pushed a small update to #pywhisker of @_nwodtuhs and @podalirius_ implementing the โ€˜sprayโ€™ action. Now you can pass a list of users and try to add the same Shadow Credentials for each of them with pywhisker from Linux ๐Ÿ‘Œ๐Ÿป

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ zux0x3a, Lawrence ๅ‹žๅ€ซๆ–ฏ ]

Ported the pascal version to C#, and becomes even better while smuggling the payload using Created Service DisplayName
https://t.co/EhR9yNybF2
what's new? => https://t.co/t7Tkv2AW4O

๐Ÿ”— https://github.com/0xsp-SRD/0xsp.com/tree/main/chopper
๐Ÿ”— https://ired.dev/discussion/13/chopper-payload-smuggling/p1?new=1

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ 0xdf_, 0xdf ]

Perspective from @hackthebox_eu is all about exploitation of a ASP.NET application. There's file read, ssrf, cookie signing, crypto, deserialization, and much more. Beyond Root has JuicyPotatoNG that's almost blocked but not.

๐Ÿ”— https://0xdf.gitlab.io/2022/10/15/htb-perspective.html

๐Ÿฅ [ tweet ]