Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ HackingLZ, Justin Elze ]

I just want to bump this excellent slide from @_wald0

πŸ₯ [ tweet ]
😈 [ praetorianlabs, Praetorian ]

As CI/CD pipelines become more prevalent, their attack surface and abuse are being leveraged more and more by advanced red teams and real-world APTs

https://t.co/okEik1OrsK

πŸ”— http://ow.ly/erVT50LmSL7

πŸ₯ [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post on using the different methods for getting a Domain object in .NET and why you should care in your tools.

https://t.co/4l8jcx8ozN

πŸ”— https://rastamouse.me/getdomain-vs-getcomputerdomain-vs-getcurrentdomain/

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Colleage of mine is currently on fire with blog posts and YouTube videos. πŸ”₯Basic AV evasion stuff but also Pentest topics, and more. Worth checking out: @lsecqt

https://t.co/xMFoxckU9D

πŸ”— https://m.youtube.com/c/Lsecqt

πŸ₯ [ tweet ]
😈 [ tiraniddo, James Forshaw ]

Finally got around to writing a blog about the Kerberos RC4-MD4 downgrade attack, how it works, and how you can exploit it. https://t.co/cBKoVtZKug

πŸ”— https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html

πŸ₯ [ tweet ]
😈 [ n00py1, n00py ]

It’s back!

https://t.co/OrO5khXz2f

πŸ”— https://crack.sh/get-cracking/

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ ORCx41, ORCA ]

had some time, so i made this; does process injection, ppid spoofing stuff, and a few other neat things ;p
https://t.co/oMgC16MubJ

πŸ”— https://github.com/ORCx41/TerraLdr

πŸ₯ [ tweet ]
😈 [ 424f424f, rvrsh3ll ]

Excellent demonstration of LPE via WebDAV to Shadow Credentials over C2 by @vendetce https://t.co/UWHAI4k51j

πŸ”— https://youtu.be/b0lLxLJKaRs?t=3549

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

Managed to create the exploit for @tiraniddo 's latest Kerberos findings!
#feelsaccomplished

πŸ₯ [ tweet ]
😈 [ sensepost, Orange Cyberdefense's SensePost Team ]

Read @defte_'s Windows authentication token manipulation deep dive to compromise Active Directory in this new blog post. Includes a new tool and a CrackMapExec module using it as a, "token" of appreciation.

https://t.co/ML8FHoIi5f

πŸ”— https://sensepost.com/blog/2022/abusing-windows-tokens-to-compromise-active-directory-without-touching-lsass/

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

We worked together with @_zblurx to pull this new feature on CME ! CrackMapExec can now authenticate using kerberos with login/pass/nthash/aeskey without the need of a KRB5CCNAME ticket env πŸš€

But wait there is more! by adding this feature we can now mimic kerbrute features πŸ”₯🫑

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ an0n_r0, an0n ]

here is a basic meterpreter protocol stager for PE stages using the libpeconv project by @hasherezade:

https://t.co/qsdb9XWvgj

no evasion included, using this only as a template. but already able to run it with a Sliver EXE beacon as a stage against Defender for Endpoint.

πŸ”— https://github.com/tothi/stager_libpeconv

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

Since there seems to be a lot of interest, I implemented the exploit for the other CVE which uses a kerberos proxy for downgrade+session key recovery.

πŸ₯ [ tweet ]

щас начнСтся, Π΅Ρ‰Π΅ ΠΏΠ°Ρ€Π° Ρ‚Π²ΠΈΡ‚ΠΎΠ² ΠΈ сорцы
πŸŽƒ [ vxunderground, vx-underground ]

From our headquarters underneath the Vatican, happy Halloween!

Today we release the first edition of our new publication Black Mass.

Special thanks to our Editor in Chief @h313n_0f_t0r for all of her hard work.

https://t.co/NbDen3RUOh

πŸ”— https://papers.vx-underground.org/papers/Other/VXUG%20Zines/Black%20Mass%20Halloween%202022.pdf

πŸ₯ [ tweet ]
πŸ‘1
😈 [ SkelSec, SkelSec ]

The two exploits for
CVE-2022-33679
CVE-2022-33647
are now available for @porchetta_ind subscribers. It will be available on github for the wider public in a few weeks.

https://t.co/c30GqXjIcx

πŸ”— https://gitlab.porchetta.industries/Skelsec/minikerberos

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

Decided to check on this writeup from @0xdf_ when I read this sentence: "I wasn’t able to get crackmapexec to work either."

With the latest update on CrackMapExec let's go for a 'Scrambled vs Crackmapexec' ! Getting root only using CME in 5 minutes πŸš€βœŒοΈ

https://t.co/hpz9JWnhzQ

πŸ”— https://gist.github.com/mpgn/9fc08b0f0fde55e8c322518bc1f9c317

πŸ₯ [ tweet ][ quote ]
Forwarded from APT
πŸ”‘ Abuse Kerberos RC4 (CVE-2022-33679)

This blog post goes into detail on how Windows Kerberos Elevation of Privilege vulnerability works and how to force Kerberos to downgrade the encoding from the default AES encryption to the historical MD4-RC4. The vulnerability could allows an attacker to obtain an authenticated session on behalf of the victim and also lead to arbitrary code execution.

Research:
https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html

Exploit:
https://github.com/Bdenneu/CVE-2022-33679

#ad #kerberos #rc4 #exploit
😈 [ SEKTOR7net, SEKTOR7 Institute ]

How to avoid memory scanners?
@kyleavery_ brings the answer.

https://t.co/0azWrDcG2N

πŸ”— https://www.youtube.com/watch?v=edIMUcxCueA

πŸ₯ [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

Nim in 100 Seconds

https://t.co/GeYgqYsM8M

πŸ”— https://www.youtube.com/watch?v=WHyOHQ_GkNo

πŸ₯ [ tweet ]
😈 [ icyguider, icyguider ]

After years of using the default examples, I've finally started writing my own custom scripts using Impacket. Wanted to share a few examples that helped me during the learning process. Hope you enjoy! https://t.co/Ya5PAhHAZC

πŸ”— https://github.com/icyguider/MoreImpacketExamples

πŸ₯ [ tweet ]
😈 [ d3lb3_, Julien Bedel ]

Just released KeeFarce Reborn, yet another offensive KeePass extraction tool featuring a standalone DLL that exports databases in cleartext once injected in the KeePass process πŸ”“
https://t.co/uHc5I8RFVo

πŸ”— https://github.com/d3lb3/KeeFarceReborn

πŸ₯ [ tweet ]