Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ Synacktiv, Synacktiv ]

Our ninjas @yaumn_ and @mickaelweb recently assessed Microsoft Defender for Identity detection capabilities. In their recent blogpost, they describe the product's architecture, present some bypasses and give general Red Team advices. https://t.co/tuBoWYEVQ9

πŸ”— https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html

πŸ₯ [ tweet ]
😈 [ _EthicalChaos_, Ceri 🏴󠁧󠁒󠁷󠁬󠁳󠁿 ]

@_RastaMouse Python via choco is great, all fluid and just works. A Hyper-V VM with Windows 11 on + choco is awesome attacking machine. I have WSL on there as backup but rarely use, even for relaying

πŸ₯ [ tweet ]

Ρ…ΠΎΡ€ΠΎΡˆΠΈΠΉ совСт для виндосСтапа ΠΎΡ‚ этикал хаоса
πŸ”₯2
😈 [ i_bo0om, Bo0oM ]

Defending against automatization using nginx

https://t.co/MTsVPFxDsJ

πŸ”— https://speakerdeck.com/bo0om/defending-against-automatization-using-nginx

πŸ₯ [ tweet ]
🀯1
😈 [ OutflankNL, Outflank ]

KerberosAsk is the latest addition to our OST offering. It is a fully inline BOF implementation of some of the core Kerberos commands from Rubeus/Kekeo.

Ask a TGT, a service ticket or exploit CVE-2022-33679. Also works with certs to support your ADCS magic.
Demo below. ⬇️ (1/3)

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

ntfsDump: just found this from @3gstudent (and used successfully for reading ntds.dit on a DC):

https://t.co/hFGhEg2eYH

similar to the powershell version Invoke-Ninjacopy, but this time it is a c++ binary. sometimes it is better to have a binary than a PS (for opsec reasons).

πŸ”— https://github.com/3gstudent/ntfsDump

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

minikerberos got a public update v0.3.5(pip+github):
Supports RC4_MD4 auth
CVE2022-33647 added
CVE2022-33679 added
RC4-TGS-REP ticket decryptor with NT hashes added (read: no need to know password)
Thx for @porchetta_ind supporters!
https://t.co/VdSkb0DEkv

πŸ”— https://github.com/skelsec/minikerberos/

πŸ₯ [ tweet ]
😈 [ EmpireC2Project, Empire ]

Interested in all the features that #EmpireC2Project has to offer? Check out our docs to stay up-to-date!
https://t.co/rR7JV1C55s

πŸ”— http://empirec2project.com

πŸ₯ [ tweet ]
😈 [ t3l3machus, Panagiotis Chartas ]

New & simple tool for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Also supports PUT requests so you can transfer files from victim to attacker box.

πŸ”— https://github.com/t3l3machus/wwwtree

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ gwendallecoguic, Gwendal Le Coguic ]

New GitHub search is πŸ”₯πŸ”₯πŸ”₯

πŸ₯ [ tweet ]
😁2
😈 [ sadreck, Pavel ]

Fresh out the oven, Spartacus DLL Hijacking Discovery all-in-one!

πŸ‘‰Utilises SysInternals ProcMon
πŸ‘‰Built-in ProcMon raw config/log parser/generator
πŸ‘‰Auto-generate DLL proxies including their Exports
πŸ‘‰Ability to process huge ProcMon outputs

https://t.co/GfVRULiE0R

πŸ”— https://github.com/Accenture/Spartacus

πŸ₯ [ tweet ]
😈 [ jdu2600, John U ]

@_xpn_ πŸ‘‹ Published a blog with an updated script that should detect each (known) class of bypass.

https://t.co/TmkBL2oWlE

πŸ”— https://www.elastic.co/security-labs/get-injectedthreadex-detection-thread-creation-trampolines

πŸ₯ [ tweet ]

Π² ΠΏΡ€ΠΎΠ΄ΠΎΠ»ΠΆΠ΅Π½ΠΈΠ΅ https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
😈 [ aceb0nd, Acebond (acebond@infosec.exchange) ]

@an0n_r0 @3gstudent https://t.co/nTA2o87ies I made this and it works with execute-assembly to stay in memory.

πŸ”— https://github.com/RedCursorSecurityConsulting/NTFSCopy

πŸ₯ [ tweet ]
😈 [ ustayready, Mike Felch ]

Want to create great phishing links using an open-redirect on https://t.co/PMEpjfi11c? While they don't last forever, they are a great way to trick unsuspecting victims into clicking a legit looking URL before expiring! https://t.co/au1tGZgHQ1 Follow the 🧡for how it works..

πŸ”— http://www.google.com
πŸ”— https://gist.github.com/ustayready/3ba2e4b1a4ec3cdad188f0f7d0dc4b73

πŸ₯ [ tweet ]
😈 [ _choisec, Sunggwan Choi ]

Finished the RTO2 course and passed the CRTL exam the during Thanksgiving break. Wrote a review blog post on the course, lab, and the exam.

https://t.co/hkxthto8wL

Thank you @_RastaMouse for yet another great course. Wonder when the "RTO3 when" meme will start.

πŸ”— https://blog.sunggwanchoi.com/red-team-ops-2-review/

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Found an vhdx/vmdk/vhd file in a network share? Volumiser from @_EthicalChaos_ gets you covered to exfiltrate e.G. SAM/SYSTEM to compromise the system via Administrator Pass-The-Hash:

https://t.co/OMiWBOVaS8

Really easy and intuitive to use πŸ‘

πŸ”— https://github.com/CCob/Volumiser

πŸ₯ [ tweet ]
😈 [ dafthack, Beau Bullock ]

"We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo"
https://t.co/KjHlNpHbLb

πŸ”— https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/

πŸ₯ [ tweet ]
😈 [ mhskai2017, kiwids ]

I wrote a blog post that talks about how we can abuse yet another Chrome Remote Debugging feature to "stalk" end users. https://t.co/xPHw3j4Qrb

πŸ”— https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949

πŸ₯ [ tweet ]
😈 [ sensepost, Orange Cyberdefense's SensePost Team ]

In this post @Sant0rryu shows an attack chain where you can abuse ADCS to escalate from a Virtual Account / Service account to local SYSTEM. As homage to other *potato tools, it could even be called CertPotato. πŸ‘€

https://t.co/5vD4a00P0G

πŸ”— https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg ]

Icymi, I'm now maintaining an Impacket fork which merges PRs a bit quicker than the official repo. This fork is dedicated to the Exegol project but can be used elsewhere if needed. You can PR there as well if you'd like and I'll do my best to review asap https://t.co/1newB3iqgs

πŸ”— https://github.com/ThePorgs/impacket

πŸ₯ [ tweet ]

Π½Π°ΠΊΠΎΠ½Π΅Ρ†-Ρ‚ΠΎ, Π±Π»Π΅Π°Ρ‚ΡŒ
πŸ”₯2