Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ SkelSec, SkelSec ]

minikerberos got a public update v0.3.5(pip+github):
Supports RC4_MD4 auth
CVE2022-33647 added
CVE2022-33679 added
RC4-TGS-REP ticket decryptor with NT hashes added (read: no need to know password)
Thx for @porchetta_ind supporters!
https://t.co/VdSkb0DEkv

πŸ”— https://github.com/skelsec/minikerberos/

πŸ₯ [ tweet ]
😈 [ EmpireC2Project, Empire ]

Interested in all the features that #EmpireC2Project has to offer? Check out our docs to stay up-to-date!
https://t.co/rR7JV1C55s

πŸ”— http://empirec2project.com

πŸ₯ [ tweet ]
😈 [ t3l3machus, Panagiotis Chartas ]

New & simple tool for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Also supports PUT requests so you can transfer files from victim to attacker box.

πŸ”— https://github.com/t3l3machus/wwwtree

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ gwendallecoguic, Gwendal Le Coguic ]

New GitHub search is πŸ”₯πŸ”₯πŸ”₯

πŸ₯ [ tweet ]
😁2
😈 [ sadreck, Pavel ]

Fresh out the oven, Spartacus DLL Hijacking Discovery all-in-one!

πŸ‘‰Utilises SysInternals ProcMon
πŸ‘‰Built-in ProcMon raw config/log parser/generator
πŸ‘‰Auto-generate DLL proxies including their Exports
πŸ‘‰Ability to process huge ProcMon outputs

https://t.co/GfVRULiE0R

πŸ”— https://github.com/Accenture/Spartacus

πŸ₯ [ tweet ]
😈 [ jdu2600, John U ]

@_xpn_ πŸ‘‹ Published a blog with an updated script that should detect each (known) class of bypass.

https://t.co/TmkBL2oWlE

πŸ”— https://www.elastic.co/security-labs/get-injectedthreadex-detection-thread-creation-trampolines

πŸ₯ [ tweet ]

Π² ΠΏΡ€ΠΎΠ΄ΠΎΠ»ΠΆΠ΅Π½ΠΈΠ΅ https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/
😈 [ aceb0nd, Acebond (acebond@infosec.exchange) ]

@an0n_r0 @3gstudent https://t.co/nTA2o87ies I made this and it works with execute-assembly to stay in memory.

πŸ”— https://github.com/RedCursorSecurityConsulting/NTFSCopy

πŸ₯ [ tweet ]
😈 [ ustayready, Mike Felch ]

Want to create great phishing links using an open-redirect on https://t.co/PMEpjfi11c? While they don't last forever, they are a great way to trick unsuspecting victims into clicking a legit looking URL before expiring! https://t.co/au1tGZgHQ1 Follow the 🧡for how it works..

πŸ”— http://www.google.com
πŸ”— https://gist.github.com/ustayready/3ba2e4b1a4ec3cdad188f0f7d0dc4b73

πŸ₯ [ tweet ]
😈 [ _choisec, Sunggwan Choi ]

Finished the RTO2 course and passed the CRTL exam the during Thanksgiving break. Wrote a review blog post on the course, lab, and the exam.

https://t.co/hkxthto8wL

Thank you @_RastaMouse for yet another great course. Wonder when the "RTO3 when" meme will start.

πŸ”— https://blog.sunggwanchoi.com/red-team-ops-2-review/

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Found an vhdx/vmdk/vhd file in a network share? Volumiser from @_EthicalChaos_ gets you covered to exfiltrate e.G. SAM/SYSTEM to compromise the system via Administrator Pass-The-Hash:

https://t.co/OMiWBOVaS8

Really easy and intuitive to use πŸ‘

πŸ”— https://github.com/CCob/Volumiser

πŸ₯ [ tweet ]
😈 [ dafthack, Beau Bullock ]

"We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo"
https://t.co/KjHlNpHbLb

πŸ”— https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/

πŸ₯ [ tweet ]
😈 [ mhskai2017, kiwids ]

I wrote a blog post that talks about how we can abuse yet another Chrome Remote Debugging feature to "stalk" end users. https://t.co/xPHw3j4Qrb

πŸ”— https://posts.specterops.io/stalking-inside-of-your-chromium-browser-757848b67949

πŸ₯ [ tweet ]
😈 [ sensepost, Orange Cyberdefense's SensePost Team ]

In this post @Sant0rryu shows an attack chain where you can abuse ADCS to escalate from a Virtual Account / Service account to local SYSTEM. As homage to other *potato tools, it could even be called CertPotato. πŸ‘€

https://t.co/5vD4a00P0G

πŸ”— https://sensepost.com/blog/2022/certpotato-using-adcs-to-privesc-from-virtual-and-network-service-accounts-to-local-system/

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg ]

Icymi, I'm now maintaining an Impacket fork which merges PRs a bit quicker than the official repo. This fork is dedicated to the Exegol project but can be used elsewhere if needed. You can PR there as well if you'd like and I'll do my best to review asap https://t.co/1newB3iqgs

πŸ”— https://github.com/ThePorgs/impacket

πŸ₯ [ tweet ]

Π½Π°ΠΊΠΎΠ½Π΅Ρ†-Ρ‚ΠΎ, Π±Π»Π΅Π°Ρ‚ΡŒ
πŸ”₯2
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#HackTip βš’οΈ] A simple post-exploitation tip when you’ve added a GitLab admin from a compomised gitlab-rails console: if there’s only LDAP auth available and you cannot sign in even when you possess valid creds, do this to enable password auth for web πŸ€“

https://t.co/uJCcbhQZNz

πŸ”— https://ppn.snovvcrash.rocks/pentest/infrastructure/devops/gitlab#gitlab-rails

πŸ₯ [ tweet ]
πŸ”₯2
HR Π·Π΄ΠΎΡ€ΠΎΠ²ΠΎΠ³ΠΎ Ρ‡Π΅Π»ΠΎΠ²Π΅ΠΊΠ°
😁6πŸ”₯5
😈 [ byt3bl33d3r, Marcello ]

Just published some research and scripts that allow you to do DLL sideloading/proxy loading with Nim DLLs.
Also, by accident figured out how to remove the NimMain function from the export table :)
https://t.co/4BVo8uPBXc

πŸ”— https://github.com/byt3bl33d3r/NimDllSideload

πŸ₯ [ tweet ]
😈 [ filip_dragovic, Filip Dragovic ]

Here is PoC for CVE-2022-41120 https://t.co/oXkBYi4bWk. I combined arb file delete and limited arb file write to get code execution as NT Authority\System.

πŸ”— https://github.com/Wh04m1001/SysmonEoP

πŸ₯ [ tweet ]
😈 [ SEKTOR7net, SEKTOR7 Institute ]

Finally made some progress (w/ help from https://t.co/M9jH1yfUK0).

Interestingly the bot logs into a box via SSH and sends the commands from the user, sharing the session between different users.

This Sunday's gonna be fun...

πŸ”— https://www.engraved.blog/building-a-virtual-machine-inside/

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye