Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ _Kudaes_, Kurosh Dabbagh ]

Unwinder, another approach to Thread Stack Spoofing by walking PE's unwind information. This technique allows to automatically create "any" desired call stack by parsing .pdata structures.
It took me a little bit longer than expected, but worth the effort!
https://t.co/9gUEanOHeC

πŸ”— https://github.com/Kudaes/Unwinder

πŸ₯ [ tweet ]
😈 [ theluemmel, ADCluemmelSec ]

Always good to have some NotCovenant running on a fully fledged Defender EDR system ^^

Thx @assume_breach for his cool writeups lately:
https://t.co/jAyRonr2sF

πŸ”— https://assume-breach.medium.com/

πŸ₯ [ tweet ]
😈 [ _dirkjan, Dirk-jan ]

The video recording of my Black Hat talk this summer "Backdooring and Hijacking Azure AD Accounts by Abusing External Identities" made it to YouTube: https://t.co/yOwxDB8reo

πŸ”— https://www.youtube.com/watch?v=uKDS2t9_KsA

πŸ₯ [ tweet ]
😈 [ gladiatx0r, Maximus ]

Just a reminder that if LDAP(S) signing/binding is not enforced then you can still LPE on any Windows workstation. Awesome video demo by @vendetce shows you how. Alternatively start Webclient programmatically https://t.co/TCanM8C6Ai or switch out P.P. for https://t.co/3i83NdpQzc

πŸ”— https://gist.github.com/klezVirus/af004842a73779e1d03d47e041115797
πŸ”— https://github.com/nccgroup/Change-Lockscreen

πŸ₯ [ tweet ][ quote ]
😈 [ Synacktiv, Synacktiv ]

Our ninjas @yaumn_ and @mickaelweb recently assessed Microsoft Defender for Identity detection capabilities. In their recent blogpost, they describe the product's architecture, present some bypasses and give general Red Team advices. https://t.co/tuBoWYEVQ9

πŸ”— https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html

πŸ₯ [ tweet ]
😈 [ _EthicalChaos_, Ceri 🏴󠁧󠁒󠁷󠁬󠁳󠁿 ]

@_RastaMouse Python via choco is great, all fluid and just works. A Hyper-V VM with Windows 11 on + choco is awesome attacking machine. I have WSL on there as backup but rarely use, even for relaying

πŸ₯ [ tweet ]

Ρ…ΠΎΡ€ΠΎΡˆΠΈΠΉ совСт для виндосСтапа ΠΎΡ‚ этикал хаоса
πŸ”₯2
😈 [ i_bo0om, Bo0oM ]

Defending against automatization using nginx

https://t.co/MTsVPFxDsJ

πŸ”— https://speakerdeck.com/bo0om/defending-against-automatization-using-nginx

πŸ₯ [ tweet ]
🀯1
😈 [ OutflankNL, Outflank ]

KerberosAsk is the latest addition to our OST offering. It is a fully inline BOF implementation of some of the core Kerberos commands from Rubeus/Kekeo.

Ask a TGT, a service ticket or exploit CVE-2022-33679. Also works with certs to support your ADCS magic.
Demo below. ⬇️ (1/3)

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

ntfsDump: just found this from @3gstudent (and used successfully for reading ntds.dit on a DC):

https://t.co/hFGhEg2eYH

similar to the powershell version Invoke-Ninjacopy, but this time it is a c++ binary. sometimes it is better to have a binary than a PS (for opsec reasons).

πŸ”— https://github.com/3gstudent/ntfsDump

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

minikerberos got a public update v0.3.5(pip+github):
Supports RC4_MD4 auth
CVE2022-33647 added
CVE2022-33679 added
RC4-TGS-REP ticket decryptor with NT hashes added (read: no need to know password)
Thx for @porchetta_ind supporters!
https://t.co/VdSkb0DEkv

πŸ”— https://github.com/skelsec/minikerberos/

πŸ₯ [ tweet ]
😈 [ EmpireC2Project, Empire ]

Interested in all the features that #EmpireC2Project has to offer? Check out our docs to stay up-to-date!
https://t.co/rR7JV1C55s

πŸ”— http://empirec2project.com

πŸ₯ [ tweet ]
😈 [ t3l3machus, Panagiotis Chartas ]

New & simple tool for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Also supports PUT requests so you can transfer files from victim to attacker box.

πŸ”— https://github.com/t3l3machus/wwwtree

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ gwendallecoguic, Gwendal Le Coguic ]

New GitHub search is πŸ”₯πŸ”₯πŸ”₯

πŸ₯ [ tweet ]
😁2
😈 [ sadreck, Pavel ]

Fresh out the oven, Spartacus DLL Hijacking Discovery all-in-one!

πŸ‘‰Utilises SysInternals ProcMon
πŸ‘‰Built-in ProcMon raw config/log parser/generator
πŸ‘‰Auto-generate DLL proxies including their Exports
πŸ‘‰Ability to process huge ProcMon outputs

https://t.co/GfVRULiE0R

πŸ”— https://github.com/Accenture/Spartacus

πŸ₯ [ tweet ]
😈 [ jdu2600, John U ]

@_xpn_ πŸ‘‹ Published a blog with an updated script that should detect each (known) class of bypass.

https://t.co/TmkBL2oWlE

πŸ”— https://www.elastic.co/security-labs/get-injectedthreadex-detection-thread-creation-trampolines

πŸ₯ [ tweet ]

Π² ΠΏΡ€ΠΎΠ΄ΠΎΠ»ΠΆΠ΅Π½ΠΈΠ΅ https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
😈 [ aceb0nd, Acebond (acebond@infosec.exchange) ]

@an0n_r0 @3gstudent https://t.co/nTA2o87ies I made this and it works with execute-assembly to stay in memory.

πŸ”— https://github.com/RedCursorSecurityConsulting/NTFSCopy

πŸ₯ [ tweet ]
😈 [ ustayready, Mike Felch ]

Want to create great phishing links using an open-redirect on https://t.co/PMEpjfi11c? While they don't last forever, they are a great way to trick unsuspecting victims into clicking a legit looking URL before expiring! https://t.co/au1tGZgHQ1 Follow the 🧡for how it works..

πŸ”— http://www.google.com
πŸ”— https://gist.github.com/ustayready/3ba2e4b1a4ec3cdad188f0f7d0dc4b73

πŸ₯ [ tweet ]
😈 [ _choisec, Sunggwan Choi ]

Finished the RTO2 course and passed the CRTL exam the during Thanksgiving break. Wrote a review blog post on the course, lab, and the exam.

https://t.co/hkxthto8wL

Thank you @_RastaMouse for yet another great course. Wonder when the "RTO3 when" meme will start.

πŸ”— https://blog.sunggwanchoi.com/red-team-ops-2-review/

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Found an vhdx/vmdk/vhd file in a network share? Volumiser from @_EthicalChaos_ gets you covered to exfiltrate e.G. SAM/SYSTEM to compromise the system via Administrator Pass-The-Hash:

https://t.co/OMiWBOVaS8

Really easy and intuitive to use πŸ‘

πŸ”— https://github.com/CCob/Volumiser

πŸ₯ [ tweet ]