Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ Synacktiv, Synacktiv ]

Our ninjas @yaumn_ and @mickaelweb recently assessed Microsoft Defender for Identity detection capabilities. In their recent blogpost, they describe the product's architecture, present some bypasses and give general Red Team advices. https://t.co/tuBoWYEVQ9

๐Ÿ”— https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _EthicalChaos_, Ceri ๐Ÿด๓ ง๓ ข๓ ท๓ ฌ๓ ณ๓ ฟ ]

@_RastaMouse Python via choco is great, all fluid and just works. A Hyper-V VM with Windows 11 on + choco is awesome attacking machine. I have WSL on there as backup but rarely use, even for relaying

๐Ÿฅ [ tweet ]

ั…ะพั€ะพัˆะธะน ัะพะฒะตั‚ ะดะปั ะฒะธะฝะดะพัะตั‚ะฐะฟะฐ ะพั‚ ัั‚ะธะบะฐะป ั…ะฐะพัะฐ
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ i_bo0om, Bo0oM ]

Defending against automatization using nginx

https://t.co/MTsVPFxDsJ

๐Ÿ”— https://speakerdeck.com/bo0om/defending-against-automatization-using-nginx

๐Ÿฅ [ tweet ]
๐Ÿคฏ1
๐Ÿ˜ˆ [ OutflankNL, Outflank ]

KerberosAsk is the latest addition to our OST offering. It is a fully inline BOF implementation of some of the core Kerberos commands from Rubeus/Kekeo.

Ask a TGT, a service ticket or exploit CVE-2022-33679. Also works with certs to support your ADCS magic.
Demo below. โฌ‡๏ธ (1/3)

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ an0n_r0, an0n ]

ntfsDump: just found this from @3gstudent (and used successfully for reading ntds.dit on a DC):

https://t.co/hFGhEg2eYH

similar to the powershell version Invoke-Ninjacopy, but this time it is a c++ binary. sometimes it is better to have a binary than a PS (for opsec reasons).

๐Ÿ”— https://github.com/3gstudent/ntfsDump

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ SkelSec, SkelSec ]

minikerberos got a public update v0.3.5(pip+github):
Supports RC4_MD4 auth
CVE2022-33647 added
CVE2022-33679 added
RC4-TGS-REP ticket decryptor with NT hashes added (read: no need to know password)
Thx for @porchetta_ind supporters!
https://t.co/VdSkb0DEkv

๐Ÿ”— https://github.com/skelsec/minikerberos/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ EmpireC2Project, Empire ]

Interested in all the features that #EmpireC2Project has to offer? Check out our docs to stay up-to-date!
https://t.co/rR7JV1C55s

๐Ÿ”— http://empirec2project.com

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ t3l3machus, Panagiotis Chartas ]

New & simple tool for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Also supports PUT requests so you can transfer files from victim to attacker box.

๐Ÿ”— https://github.com/t3l3machus/wwwtree

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ gwendallecoguic, Gwendal Le Coguic ]

New GitHub search is ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

๐Ÿฅ [ tweet ]
๐Ÿ˜2
๐Ÿ˜ˆ [ sadreck, Pavel ]

Fresh out the oven, Spartacus DLL Hijacking Discovery all-in-one!

๐Ÿ‘‰Utilises SysInternals ProcMon
๐Ÿ‘‰Built-in ProcMon raw config/log parser/generator
๐Ÿ‘‰Auto-generate DLL proxies including their Exports
๐Ÿ‘‰Ability to process huge ProcMon outputs

https://t.co/GfVRULiE0R

๐Ÿ”— https://github.com/Accenture/Spartacus

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ jdu2600, John U ]

@_xpn_ ๐Ÿ‘‹ Published a blog with an updated script that should detect each (known) class of bypass.

https://t.co/TmkBL2oWlE

๐Ÿ”— https://www.elastic.co/security-labs/get-injectedthreadex-detection-thread-creation-trampolines

๐Ÿฅ [ tweet ]

ะฒ ะฟั€ะพะดะพะปะถะตะฝะธะต https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
๐Ÿ˜ˆ [ aceb0nd, Acebond (acebond@infosec.exchange) ]

@an0n_r0 @3gstudent https://t.co/nTA2o87ies I made this and it works with execute-assembly to stay in memory.

๐Ÿ”— https://github.com/RedCursorSecurityConsulting/NTFSCopy

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ustayready, Mike Felch ]

Want to create great phishing links using an open-redirect on https://t.co/PMEpjfi11c? While they don't last forever, they are a great way to trick unsuspecting victims into clicking a legit looking URL before expiring! https://t.co/au1tGZgHQ1 Follow the ๐Ÿงตfor how it works..

๐Ÿ”— http://www.google.com
๐Ÿ”— https://gist.github.com/ustayready/3ba2e4b1a4ec3cdad188f0f7d0dc4b73

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _choisec, Sunggwan Choi ]

Finished the RTO2 course and passed the CRTL exam the during Thanksgiving break. Wrote a review blog post on the course, lab, and the exam.

https://t.co/hkxthto8wL

Thank you @_RastaMouse for yet another great course. Wonder when the "RTO3 when" meme will start.

๐Ÿ”— https://blog.sunggwanchoi.com/red-team-ops-2-review/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ShitSecure, S3cur3Th1sSh1t ]

Found an vhdx/vmdk/vhd file in a network share? Volumiser from @_EthicalChaos_ gets you covered to exfiltrate e.G. SAM/SYSTEM to compromise the system via Administrator Pass-The-Hash:

https://t.co/OMiWBOVaS8

Really easy and intuitive to use ๐Ÿ‘

๐Ÿ”— https://github.com/CCob/Volumiser

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ dafthack, Beau Bullock ]

"We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo"
https://t.co/KjHlNpHbLb

๐Ÿ”— https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mhskai2017, kiwids ]

I wrote a blog post that talks about how we can abuse yet another Chrome Remote Debugging feature to "stalk" end users. https://t.co/xPHw3j4Qrb

๐Ÿ”— https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ sensepost, Orange Cyberdefense's SensePost Team ]

In this post @Sant0rryu shows an attack chain where you can abuse ADCS to escalate from a Virtual Account / Service account to local SYSTEM. As homage to other *potato tools, it could even be called CertPotato. ๐Ÿ‘€

https://t.co/5vD4a00P0G

๐Ÿ”— https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _nwodtuhs, Charlie Bromberg ]

Icymi, I'm now maintaining an Impacket fork which merges PRs a bit quicker than the official repo. This fork is dedicated to the Exegol project but can be used elsewhere if needed. You can PR there as well if you'd like and I'll do my best to review asap https://t.co/1newB3iqgs

๐Ÿ”— https://github.com/ThePorgs/impacket

๐Ÿฅ [ tweet ]

ะฝะฐะบะพะฝะตั†-ั‚ะพ, ะฑะปะตะฐั‚ัŒ
๐Ÿ”ฅ2
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

[#HackTip โš’๏ธ] A simple post-exploitation tip when youโ€™ve added a GitLab admin from a compomised gitlab-rails console: if thereโ€™s only LDAP auth available and you cannot sign in even when you possess valid creds, do this to enable password auth for web ๐Ÿค“

https://t.co/uJCcbhQZNz

๐Ÿ”— https://ppn.snovvcrash.rocks/pentest/infrastructure/devops/gitlab#gitlab-rails

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2