Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ aetsu, ๐•ฌ๐–Š๐–™๐–˜๐–š ]

TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

https://t.co/jZ8KQnSUxs

๐Ÿ”— https://github.com/h3xduck/TripleCross

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ testanull, Janggggg ]

You guys must be waiting for this,
So this is the working PoC script of the Exchange 0day exploited ITW

https://t.co/XGx0fYJygm

๐Ÿ”— https://github.com/testanull/ProxyNotShell-PoC

๐Ÿฅ [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
ะะพะฒั‹ะต ััŽั€ะฟั€ะธะทั‹ ะฒ AD CS... ะ”ะพะฑะฐะฒะธะผ ั‚ะตั…ะฝะธะบัƒ ESC11๐Ÿ™ˆ

https://blog.compass-security.com/2022/11/relaying-to-ad-certificate-services-over-rpc/

#ad #pentest #redteam
๐Ÿ˜ˆ [ Ben0xA, Ben Ten (0xA) ]

Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast

๐Ÿ”— https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ BushidoToken, Will | Darknet Diaries #126 ]

๐Ÿ‘‰New Blog: I have attempted to track what happened to Conti this year after the leaks and collapse of the group. Here are my findings, largely based on #OSINT. Enjoy!

https://t.co/0jSd1ZFkLf #Conti #Quantum #BlackBasta #Royal #WizardSpider #CTI

๐Ÿ”— https://blog.bushidotoken.net/2022/11/the-continuity-of-conti.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ splinter_code, Antonio Cocomazzi ]

A bad news for all potato lovers ๐Ÿ˜ญ

Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick to recover the INTERACTIVE sid group through the logon type New Credentials (9).

More details here ๐Ÿ‘‡

https://t.co/hfhZxk3zMg

cc @decoder_it

๐Ÿ”— https://github.com/antonioCoco/JuicyPotatoNG/issues/4

๐Ÿฅ [ tweet ]
๐Ÿ˜ข1
ะฏ, ะบะพะฝะตั‡ะฝะพ, ะฝะต ั…ะฒะฐัั‚ะฐัŽััŒ, ะฝะพโ€ฆ ๐Ÿ˜ณ๐Ÿ˜ฑ
๐Ÿ”ฅ17๐Ÿ˜8๐Ÿค”1
๐Ÿ˜ˆ [ 0xdf_, 0xdf ]

Hathor from @hackthebox_eu was a monster Windows box. My favorite parts were being forced to understand the AppLocker rules, and finding the code signing cert in the recycle bin and using it to bypass applocker. Lots of tricky steps on this one.

https://t.co/thTyAtHW9p

๐Ÿ”— https://0xdf.gitlab.io/2022/11/19/htb-hathor.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ 0xBoku, Bobby Cooke ]

Checkout SQLRecon by @sanjivkawa! C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
https://t.co/qSWDXimeJS
The tool has a great wiki on how to use it and you can find conference talks & slide decks on the tool here: https://t.co/W5EKXDIrJI

๐Ÿ”— https://github.com/xforcered/SQLRecon
๐Ÿ”— https://github.com/skahwah/Conference-Talks/tree/main/2022-Way-West-Hackin-Fest

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _xpn_, Adam Chester ]

Having a bit of fun on Mastodon this weekend creating S-Rank Influencer accounts by mocking out ActivityPub ๐Ÿ˜‚๐Ÿ˜‚ https://t.co/OP5PXwrLFW

๐Ÿ”— https://infosec.exchange/@xpn/109371536418521307

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ali_alwashali, Ali Alwashali-ng ]

Windows hardening script
https://t.co/b7QWvXL5iB

Leverages windows firewall to block certain binaries from making connections
Sets lsass in protected mode
Implementation of ASR rules
Harden office
Disables DNS multicast, smbv1, netbios, powershellv2
Change file associations

๐Ÿ”— https://gist.github.com/mackwage/08604751462126599d7e52f233490efe

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ T00uF, TouF ]

Just pushed a HUGE refacto in #DonPapi to make it work with Kerberos TGT.
seems your clients are as my clients and don't use protected users enough ๐Ÿ˜…
or maybe you were using the --laps options to automatically retrieve local admin credz ? ๐Ÿค”

https://t.co/XiCB7MDVEs

๐Ÿ”— https://github.com/login-securite/DonPAPI

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _Kudaes_, Kurosh Dabbagh ]

Unwinder, another approach to Thread Stack Spoofing by walking PE's unwind information. This technique allows to automatically create "any" desired call stack by parsing .pdata structures.
It took me a little bit longer than expected, but worth the effort!
https://t.co/9gUEanOHeC

๐Ÿ”— https://github.com/Kudaes/Unwinder

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ theluemmel, ADCluemmelSec ]

Always good to have some NotCovenant running on a fully fledged Defender EDR system ^^

Thx @assume_breach for his cool writeups lately:
https://t.co/jAyRonr2sF

๐Ÿ”— https://assume-breach.medium.com/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _dirkjan, Dirk-jan ]

The video recording of my Black Hat talk this summer "Backdooring and Hijacking Azure AD Accounts by Abusing External Identities" made it to YouTube: https://t.co/yOwxDB8reo

๐Ÿ”— https://www.youtube.com/watch?v=uKDS2t9_KsA

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ gladiatx0r, Maximus ]

Just a reminder that if LDAP(S) signing/binding is not enforced then you can still LPE on any Windows workstation. Awesome video demo by @vendetce shows you how. Alternatively start Webclient programmatically https://t.co/TCanM8C6Ai or switch out P.P. for https://t.co/3i83NdpQzc

๐Ÿ”— https://gist.github.com/klezVirus/af004842a73779e1d03d47e041115797
๐Ÿ”— https://github.com/nccgroup/Change-Lockscreen

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ Synacktiv, Synacktiv ]

Our ninjas @yaumn_ and @mickaelweb recently assessed Microsoft Defender for Identity detection capabilities. In their recent blogpost, they describe the product's architecture, present some bypasses and give general Red Team advices. https://t.co/tuBoWYEVQ9

๐Ÿ”— https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _EthicalChaos_, Ceri ๐Ÿด๓ ง๓ ข๓ ท๓ ฌ๓ ณ๓ ฟ ]

@_RastaMouse Python via choco is great, all fluid and just works. A Hyper-V VM with Windows 11 on + choco is awesome attacking machine. I have WSL on there as backup but rarely use, even for relaying

๐Ÿฅ [ tweet ]

ั…ะพั€ะพัˆะธะน ัะพะฒะตั‚ ะดะปั ะฒะธะฝะดะพัะตั‚ะฐะฟะฐ ะพั‚ ัั‚ะธะบะฐะป ั…ะฐะพัะฐ
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ i_bo0om, Bo0oM ]

Defending against automatization using nginx

https://t.co/MTsVPFxDsJ

๐Ÿ”— https://speakerdeck.com/bo0om/defending-against-automatization-using-nginx

๐Ÿฅ [ tweet ]
๐Ÿคฏ1