Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ 0xdf_, 0xdf ]

Shared from @hackthebox_eu has SQL injection in a cookie, iPython exploitation, some basic reverse enginnering, and Redis exploitation.

https://t.co/1ayMOYjPOw

πŸ”— https://0xdf.gitlab.io/2022/11/12/htb-shared.html

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

Play with the ad lab goadv2 - part 10 : delegations
- constrained
- unconstrained (with and without protocol transition)
- resource based

https://t.co/47zFWSD7G9

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part10/

πŸ₯ [ tweet ]
😈 [ CaptMeelo, Meelo ]

Here's the tool that I demoed during my #SANSHackFest talk. Let's make it better by filing any issues you identified and submitting PRs.
#redteam #maldev
https://t.co/KvCJzVwSxi

πŸ”— https://github.com/capt-meelo/laZzzy

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

CrackMapExec version 5.4.0 "Indestructible G0thm0g" is out for everyone and also available in @kalilinux πŸŽ‰

➑️ apt update
➑️ apt install crackmapexec

Happy Hacking ! πŸ”₯πŸͺ‚

Release blog post πŸ”½
https://t.co/gtOA7tt8Ey

πŸ”— https://wiki.porchetta.industries/news-2022/indestructible-g0thm0g

πŸ₯ [ tweet ]
😈 [ dec0ne, Mor Davidovich ]

Happy to share a new blog post I wrote about how I managed to dump LSASS undetected using a simple MiniDumpWriteDump against some of the most advanced EDRs in the market.

"It’s all in the details: The curious case of an LSASS dumper gone undetected"

https://t.co/YoDUW8LwKy

πŸ”— https://dec0ne.github.io/research/2022-11-14-Undetected-Lsass-Dump-Workflow/

πŸ₯ [ tweet ]
😈 [ cerbersec, Cerbersec ]

Here are the #SANSHackFest demos for my Kernel Karnage talk!

WinDbg: https://t.co/RicezA3tkG
Full attack chain: https://t.co/spIcXE27Wk

πŸ”— https://youtu.be/QHEzyCGz-rk
πŸ”— https://youtu.be/EQqxQk7ytjw

πŸ₯ [ tweet ]
😈 [ _EthicalChaos_, Ceri 🏴󠁧󠁒󠁷󠁬󠁳󠁿 ]

Just pushed a small change for the recently released Volumiser tool. You can now read files directly al a NinjaCopy style from physical disk and volume handles. Handy for exfiltrating registry hives or ntds.dit on hosts with EDR's.

πŸ₯ [ tweet ]
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― | Ω„ΩˆΨ±Ψ§Ω†Ψ³ ]

https://t.co/nOAPMLpyhw

πŸ”— https://www.cyberwarfare.live/blog/vectored-syscall-poc

πŸ₯ [ tweet ]
😈 [ t3l3machus, Panagiotis Chartas ]

Using 𝐕𝐒π₯π₯𝐚𝐒𝐧, the evolution of π‡π¨πšπ±π’π‘πžπ₯π₯ to generate an auto-obfuscated PowerShell backdoor payload, bypass Defender and gain access to a Windows 11 Enterprise machine.

Download, install, connect with others & enjoy hacking as a team: https://t.co/PNuUQLhV6J

πŸ”— https://github.com/t3l3machus/Villain

πŸ₯ [ tweet ]
😈 [ cyb3rops, Florian Roth ⚑ ]

Imagine you'd get access to an unknown SIEM of a new customer & would be given 10min to find malicious activity by using keyword searches on raw data, what would you search for?

I'll start

'.dmp full'
'whoami'
'delete shadows'
'FromBase64String'
'save HKLM\SAM'
' -w hidden '

πŸ₯ [ tweet ]
πŸ€”1
😈 [ jack_halon, Jack Halon ]

Today I am releasing part 2 of my 3-part browser exploitation series on Chrome!

In part 2, we take a deep dive into the V8 compiler pipeline by understanding what happens under the hood in Ignition, Sparkplug, and TurboFan!

Enjoy!

https://t.co/XAnbzdnjeQ

πŸ”— https://jhalon.github.io/chrome-browser-exploitation-2/

πŸ₯ [ tweet ]
😈 [ aetsu, π•¬π–Šπ–™π–˜π–š ]

TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

https://t.co/jZ8KQnSUxs

πŸ”— https://github.com/h3xduck/TripleCross

πŸ₯ [ tweet ]
😈 [ testanull, Janggggg ]

You guys must be waiting for this,
So this is the working PoC script of the Exchange 0day exploited ITW

https://t.co/XGx0fYJygm

πŸ”— https://github.com/testanull/ProxyNotShell-PoC

πŸ₯ [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
НовыС ΡΡŽΡ€ΠΏΡ€ΠΈΠ·Ρ‹ Π² AD CS... Π”ΠΎΠ±Π°Π²ΠΈΠΌ Ρ‚Π΅Ρ…Π½ΠΈΠΊΡƒ ESC11πŸ™ˆ

https://blog.compass-security.com/2022/11/relaying-to-ad-certificate-services-over-rpc/

#ad #pentest #redteam
😈 [ Ben0xA, Ben Ten (0xA) ]

Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast

πŸ”— https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/

πŸ₯ [ tweet ]
😈 [ BushidoToken, Will | Darknet Diaries #126 ]

πŸ‘‰New Blog: I have attempted to track what happened to Conti this year after the leaks and collapse of the group. Here are my findings, largely based on #OSINT. Enjoy!

https://t.co/0jSd1ZFkLf #Conti #Quantum #BlackBasta #Royal #WizardSpider #CTI

πŸ”— https://blog.bushidotoken.net/2022/11/the-continuity-of-conti.html

πŸ₯ [ tweet ]
😈 [ splinter_code, Antonio Cocomazzi ]

A bad news for all potato lovers 😭

Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick to recover the INTERACTIVE sid group through the logon type New Credentials (9).

More details here πŸ‘‡

https://t.co/hfhZxk3zMg

cc @decoder_it

πŸ”— https://github.com/antonioCoco/JuicyPotatoNG/issues/4

πŸ₯ [ tweet ]
😒1
Π―, ΠΊΠΎΠ½Π΅Ρ‡Π½ΠΎ, Π½Π΅ Ρ…Π²Π°ΡΡ‚Π°ΡŽΡΡŒ, но… 😳😱
πŸ”₯17😁8πŸ€”1
😈 [ 0xdf_, 0xdf ]

Hathor from @hackthebox_eu was a monster Windows box. My favorite parts were being forced to understand the AppLocker rules, and finding the code signing cert in the recycle bin and using it to bypass applocker. Lots of tricky steps on this one.

https://t.co/thTyAtHW9p

πŸ”— https://0xdf.gitlab.io/2022/11/19/htb-hathor.html

πŸ₯ [ tweet ]