Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ cnotin, Clรฉment Notin ]

AdminSDHolder also has a useful SACL, with this ACE allowing to log many actions performed on privileged objects it is applied to.
It's a lesser known feature!

๐Ÿฅ [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
ะ”ะพะฒะพะปัŒะฝะพ ะธะฝั‚ะตั€ะตัะฝะฐั ัั‚ะฐั‚ัŒั, ะบะฐะบ ะพะฑั…ะพะดะธั‚ัŒ EDR ั ะฟะพะผะพั‰ัŒัŽ python)))

https://www.naksyn.com/edr%20evasion/2022/09/01/operating-into-EDRs-blindspot.html

#redteam #pentest #bypass
๐Ÿ˜ˆ [ n00py1, n00py ]

Web vulns you should look for on an internal pentest: XXE.

We often think of XXE as a way to read local files, but you can also use it to coerce auth. HTTP NTLM does not request signing so you can easily relay it to LDAP. Web service accounts are often over permissioned.

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ HackerGautam, Frooti ]

Not only crawling but you can do Subdomain Enumeration using Wayback.

โฌ‡๏ธ
curl --insecure --silent "http://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u

#bugbounty #hacking #infosec

๐Ÿฅ [ tweet ]
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

This is how easter eggs are found ๐Ÿ˜… @_nwodtuhs @podalirius_

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ ORCx41, ORCA ]

decided to release this, a highly capable pe packer, with a lot of nice features
https://t.co/iedhKbTlzm

๐Ÿ”— https://github.com/ORCx41/AtomPePacker

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ g0h4n_0, g0h4n ]

Today I share with you #RustHound๐Ÿฆ€. A new AD collector written in #Rust for #BloodHound!
It is cross-platform, cross-compiled and generates all json files needed.

Other modules will be available as under development!๐Ÿ”ฅ

Hope you will enjoy it!

https://t.co/bxjCVyocfv https://t.co/8jEcSuEdEj

๐Ÿ”— https://github.com/OPENCYBER-FR/RustHound

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ FortaliceLLC, Fortalice Solutions ]

NTLM Relaying to SCCM for the win ๐Ÿ‘€๐Ÿ‘€๐Ÿ‘€ Fortalice's @Tw1sm just added SCCM support to NtlmRelayX. Check out the PR at: https://t.co/hWfNeiuqxp

๐Ÿ”— https://github.com/SecureAuthCorp/impacket/pull/1425

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mpgn_x64, mpgn ]

New update on CrackMapExec ๐Ÿ”ฝ

โžก๏ธ Upload/download with MSSQL -guervild
โžก๏ธ Exploit KeePass (discover, trigger) @d3lb3_ ๐Ÿ”ฅ
โžก๏ธ ACL read with LDAP @BlWasp_
โžก๏ธ Check ntlmv1 (postex) @Tw1sm
โžก๏ธ Check alwayselevated (postex) -bogey3
โžก๏ธ Improved export on cmedb @gray_sec

๐Ÿช‚

๐Ÿฅ [ tweet ]
Forwarded from Offensive Xwitter Eye
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

Based on @dec0neโ€™s work on ShadowSpray Iโ€™ve pushed a small update to #pywhisker of @_nwodtuhs and @podalirius_ implementing the โ€˜sprayโ€™ action. Now you can pass a list of users and try to add the same Shadow Credentials for each of them with pywhisker from Linux ๐Ÿ‘Œ๐Ÿป

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ zux0x3a, Lawrence ๅ‹žๅ€ซๆ–ฏ ]

Ported the pascal version to C#, and becomes even better while smuggling the payload using Created Service DisplayName
https://t.co/EhR9yNybF2
what's new? => https://t.co/t7Tkv2AW4O

๐Ÿ”— https://github.com/0xsp-SRD/0xsp.com/tree/main/chopper
๐Ÿ”— https://ired.dev/discussion/13/chopper-payload-smuggling/p1?new=1

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ 0xdf_, 0xdf ]

Perspective from @hackthebox_eu is all about exploitation of a ASP.NET application. There's file read, ssrf, cookie signing, crypto, deserialization, and much more. Beyond Root has JuicyPotatoNG that's almost blocked but not.

๐Ÿ”— https://0xdf.gitlab.io/2022/10/15/htb-perspective.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ dr4k0nia, dr4k0nia ]

Time for another blog post :) This time Im writing about building my own string encryption obfuscator in C#. Featuring a simple XOR based cipher and unique per string encryption keys. Works from .NET Framework 4.6+ up to latest .NET
https://t.co/htjR6XdS1Q

๐Ÿ”— https://dr4k0nia.github.io/dotnet/coding/2022/10/15/Encrypting-Strings-In-NET.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ zux0x3a, Lawrence ๅ‹žๅ€ซๆ–ฏ | ู„ูˆุฑุงู†ุณ ]

https://t.co/QOrhGwKctm
CredUI shellcoder runner shared !

๐Ÿ”— https://ired.dev/discussion/comment/4/#Comment_4

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ dr4k0nia, dr4k0nia ]

Alongside my latest blog post about string encryption in .NET Im also releasing the source code of my string encryption obfuscator. https://t.co/eQVP1ZVAjt

๐Ÿ”— https://github.com/dr4k0nia/XorStringsNET

๐Ÿฅ [ tweet ]