Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ n00py1, n00py ]

Web vulns you should look for on an internal pentest: XXE.

We often think of XXE as a way to read local files, but you can also use it to coerce auth. HTTP NTLM does not request signing so you can easily relay it to LDAP. Web service accounts are often over permissioned.

πŸ₯ [ tweet ]
😈 [ HackerGautam, Frooti ]

Not only crawling but you can do Subdomain Enumeration using Wayback.

⬇️
curl --insecure --silent "http://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u

#bugbounty #hacking #infosec

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

This is how easter eggs are found πŸ˜… @_nwodtuhs @podalirius_

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ ORCx41, ORCA ]

decided to release this, a highly capable pe packer, with a lot of nice features
https://t.co/iedhKbTlzm

πŸ”— https://github.com/ORCx41/AtomPePacker

πŸ₯ [ tweet ]
😈 [ g0h4n_0, g0h4n ]

Today I share with you #RustHoundπŸ¦€. A new AD collector written in #Rust for #BloodHound!
It is cross-platform, cross-compiled and generates all json files needed.

Other modules will be available as under development!πŸ”₯

Hope you will enjoy it!

https://t.co/bxjCVyocfv https://t.co/8jEcSuEdEj

πŸ”— https://github.com/OPENCYBER-FR/RustHound

πŸ₯ [ tweet ][ quote ]
😈 [ FortaliceLLC, Fortalice Solutions ]

NTLM Relaying to SCCM for the win πŸ‘€πŸ‘€πŸ‘€ Fortalice's @Tw1sm just added SCCM support to NtlmRelayX. Check out the PR at: https://t.co/hWfNeiuqxp

πŸ”— https://github.com/SecureAuthCorp/impacket/pull/1425

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

New update on CrackMapExec πŸ”½

➑️ Upload/download with MSSQL -guervild
➑️ Exploit KeePass (discover, trigger) @d3lb3_ πŸ”₯
➑️ ACL read with LDAP @BlWasp_
➑️ Check ntlmv1 (postex) @Tw1sm
➑️ Check alwayselevated (postex) -bogey3
➑️ Improved export on cmedb @gray_sec

πŸͺ‚

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Based on @dec0ne’s work on ShadowSpray I’ve pushed a small update to #pywhisker of @_nwodtuhs and @podalirius_ implementing the β€˜spray’ action. Now you can pass a list of users and try to add the same Shadow Credentials for each of them with pywhisker from Linux πŸ‘ŒπŸ»

πŸ₯ [ tweet ]
πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― ]

Ported the pascal version to C#, and becomes even better while smuggling the payload using Created Service DisplayName
https://t.co/EhR9yNybF2
what's new? => https://t.co/t7Tkv2AW4O

πŸ”— https://github.com/0xsp-SRD/0xsp.com/tree/main/chopper
πŸ”— https://ired.dev/discussion/13/chopper-payload-smuggling/p1?new=1

πŸ₯ [ tweet ]
😈 [ 0xdf_, 0xdf ]

Perspective from @hackthebox_eu is all about exploitation of a ASP.NET application. There's file read, ssrf, cookie signing, crypto, deserialization, and much more. Beyond Root has JuicyPotatoNG that's almost blocked but not.

πŸ”— https://0xdf.gitlab.io/2022/10/15/htb-perspective.html

πŸ₯ [ tweet ]
😈 [ dr4k0nia, dr4k0nia ]

Time for another blog post :) This time Im writing about building my own string encryption obfuscator in C#. Featuring a simple XOR based cipher and unique per string encryption keys. Works from .NET Framework 4.6+ up to latest .NET
https://t.co/htjR6XdS1Q

πŸ”— https://dr4k0nia.github.io/dotnet/coding/2022/10/15/Encrypting-Strings-In-NET.html

πŸ₯ [ tweet ]
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― | Ω„ΩˆΨ±Ψ§Ω†Ψ³ ]

https://t.co/QOrhGwKctm
CredUI shellcoder runner shared !

πŸ”— https://ired.dev/discussion/comment/4/#Comment_4

πŸ₯ [ tweet ]
😈 [ dr4k0nia, dr4k0nia ]

Alongside my latest blog post about string encryption in .NET Im also releasing the source code of my string encryption obfuscator. https://t.co/eQVP1ZVAjt

πŸ”— https://github.com/dr4k0nia/XorStringsNET

πŸ₯ [ tweet ]
😈 [ 424f424f, rvrsh3ll ]

Minor update to my BOF_Collection to make compiling a bit easier. https://t.co/SP7Bp4QTxg

πŸ”— https://github.com/rvrsh3ll/BOF_Collection

πŸ₯ [ tweet ]
😈 [ ORCx41, ORCA ]

Ever wanted to run your payload without being boring ? here you go ...
https://t.co/FmMEwiGWKV

πŸ”— https://github.com/ORCx41/NoRunPI

πŸ₯ [ tweet ]
😈 [ 424f424f, rvrsh3ll ]

A shellcode loader in the @MicrosoftStore ? What could go wrong.
https://t.co/V8M5iqHu9t

πŸ”— https://apps.microsoft.com/store/detail/shellcode-loader/9P6M7GWNH769

πŸ₯ [ tweet ]