Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ OutflankNL, Outflank ]

New BOF released to our OST customers: Coercer

Coercer triggers a novel and non-public coercion method that forces SMB authentication from the computer account on workstations. From there on, you can for example relay to ADCS for generating a computer certificate.

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post on alternate ways to impersonate access tokens in C#, including in other threads. Thanks @GuhnooPlusLinux for providing the inspiration.

https://t.co/TRdI5zuR5j

๐Ÿ”— https://rastamouse.me/token-impersonation-in-csharp/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ 0xdf_, 0xdf ]

Support is the 4th box I've released on @hackthebox_eu! It retires today. Light .NET reverseing, LDAP enumeration, and genericall on the DC -> a fake machine AD attack.

Inspiration for the box comes from a @7minsec "tales of pentest pwnage" episode.

https://t.co/79G4EUS7Nt

๐Ÿ”— https://0xdf.gitlab.io/2022/12/17/htb-support.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ Idov31, Ido Veltzman ]

I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.

https://t.co/AVxQbNru3Z

#infosec #CyberSecurity

๐Ÿ”— https://github.com/Idov31/Venom

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ an0n_r0, an0n ]

1. remove disk from target laptop
2. virtualize system (VBoxManage convertfromraw)
3. abuse local admin (chntpw using alt booted system)
4. run mimikatz by reflective loading (bypass ESET :) )
5. extract machine cert / secrets

NEVER deploy company laptop without BitLocker.

๐Ÿฅ [ tweet ]
๐Ÿ˜5๐Ÿ”ฅ2๐Ÿฅฑ1
๐Ÿ˜ˆ [ namazso, namazso ]

After being asked for it a few times in DMs, I decided to just publish my ptrace-less injector for x64 Linux

https://t.co/zqsP0xiJdZ

(via @namazso@mastodon.cloud)

๐Ÿ”— https://github.com/namazso/linux_injector

๐Ÿฅ [ tweet ]
ะ›ั, ะฟะพั‡ะตะผัƒ ัั‚ะพ ั‚ะฐะบ ะพั€ะฝะพ
๐Ÿ˜4
๐Ÿ˜ˆ [ _nwodtuhs, Charlie Bromberg โ€œShutdownโ€ ]

๐ŸŽ… xmas contribution to one of the tools I used most in 2022. #BloodHound

https://t.co/KqJYEOfzOs

๐Ÿ”— https://github.com/BloodHoundAD/BloodHound/pull/625

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ IKalendarov, Ilan Kalendarov ]

New research of mine about using hardware breakpoint for EDR evasion. Thanks to @rad9800 for the inspiration on this topic.

https://t.co/Ax2IZkSOI2

๐Ÿ”— https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints?utm_campaign=Oktopost-Research&utm_content=Oktopost-Twitter&utm_medium=Twitter&utm_source=Organic_Social

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mariuszbit, mgeeky | Mariusz Banach ]

โ˜ข๏ธ Recently we started seeing Threat Actors abusing MSI Windows Installation files for Initial Access & code execution

๐Ÿ”ฅ I now release Part 1 insights into how MSIs can be abused, PoCs for ๐Ÿ”ด & dissection utility for ๐Ÿ”ต

๐Ÿฆ  Let me know what you think!

https://t.co/X7vi6BGQg5

๐Ÿ”— https://mgeeky.tech/msi-shenanigans-part-1/
๐Ÿ”— https://github.com/mgeeky/msi-shenanigans
๐Ÿ”— https://github.com/mgeeky/msidump

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

I've been trying to get NtCreateUserProcess working in C#, but no joy yet. If anyone wants to take a stab at fixing the code, it's here:

https://t.co/ma3iuCSFjj

๐Ÿ”— https://gist.github.com/rasta-mouse/2f6316083dd2f38bb91f160cca2088df

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ M4yFly, Mayfly ]

Finally, the last part of GOAD writeups is done ! ๐Ÿฅณ
Part 12 : Trusts

https://t.co/q6XDr8GTUD

๐Ÿ”— https://mayfly277.github.io/posts/GOADv2-pwning-part12/

๐Ÿฅ [ tweet ]
ะŸะธัะฐะป ั‚ัƒั‚ ะฝะฐ ะบะพะปะตะฝะบะต ัะบั€ะธะฟั‚ ะดะปั ัะฝัƒะผะฐ ััƒั‰ะตัั‚ะฒัƒัŽั‰ะธั… ะตะผะตะนะปะพะฒ ะฝะฐ Mail.ru ั‡ะตั€ะตะท Tor. ะขะตะบัั‚ะพะผ ะฝะต ะพั‚ะดะฐะผ, ะฟั€ะธะดะตั‚ัั ะฟะตั€ะตะฟะธัั‹ะฒะฐั‚ัŒ ๐Ÿ˜†
๐Ÿ”ฅ6
๐Ÿ˜ˆ [ sprocket_ed, ed ]

Not bad - https://t.co/RdbIsLfGRy

๐Ÿ”— https://github.com/m1guelpf/plz-cli

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ4
๐Ÿ˜ˆ [ an0n_r0, an0n ]

what a wonderful technique for stealing chrome/edge cookies without knowing the user password via chrome debug mode by @mangopdf:

https://t.co/T2ct1WI6e3

have not known it before (what a shame๐Ÿ˜„), although it is 4+ yrs old and still working.

here it is, demo using Sliver C2.๐Ÿ”ฅ

๐Ÿ”— https://mango.pdf.zone/stealing-chrome-cookies-without-a-password

๐Ÿฅ [ tweet ]
Forwarded from Offensive Xwitter Eye
๐Ÿ”ฅ5
๐Ÿ˜ˆ [ splinter_code, Antonio Cocomazzi ]

Excited to share my latest research about the Vice Society Ransomware group and the growing threat of custom-branded ransomware! ๐Ÿ”ฅ

https://t.co/5gMHUwBtcS

๐Ÿ”— https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

I pushed all the NtCreateUserProcess stuff to my D/Invoke wiki.

https://t.co/tcv8vKrE86

๐Ÿ”— https://dinvoke.net/en/ntdll/NtCreateUserProcess

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ zux0x3a, Lawrence ๅ‹žๅ€ซๆ–ฏ | ู„ูˆุฑุงู†ุณ ]

https://t.co/iBYhtXgMnn Comprehensive Rust Course

๐Ÿ”— https://google.github.io/comprehensive-rust/

๐Ÿฅ [ tweet ]