Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ an0n_r0, an0n ]

1. remove disk from target laptop
2. virtualize system (VBoxManage convertfromraw)
3. abuse local admin (chntpw using alt booted system)
4. run mimikatz by reflective loading (bypass ESET :) )
5. extract machine cert / secrets

NEVER deploy company laptop without BitLocker.

๐Ÿฅ [ tweet ]
๐Ÿ˜5๐Ÿ”ฅ2๐Ÿฅฑ1
๐Ÿ˜ˆ [ namazso, namazso ]

After being asked for it a few times in DMs, I decided to just publish my ptrace-less injector for x64 Linux

https://t.co/zqsP0xiJdZ

(via @namazso@mastodon.cloud)

๐Ÿ”— https://github.com/namazso/linux_injector

๐Ÿฅ [ tweet ]
ะ›ั, ะฟะพั‡ะตะผัƒ ัั‚ะพ ั‚ะฐะบ ะพั€ะฝะพ
๐Ÿ˜4
๐Ÿ˜ˆ [ _nwodtuhs, Charlie Bromberg โ€œShutdownโ€ ]

๐ŸŽ… xmas contribution to one of the tools I used most in 2022. #BloodHound

https://t.co/KqJYEOfzOs

๐Ÿ”— https://github.com/BloodHoundAD/BloodHound/pull/625

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ IKalendarov, Ilan Kalendarov ]

New research of mine about using hardware breakpoint for EDR evasion. Thanks to @rad9800 for the inspiration on this topic.

https://t.co/Ax2IZkSOI2

๐Ÿ”— https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints?utm_campaign=Oktopost-Research&utm_content=Oktopost-Twitter&utm_medium=Twitter&utm_source=Organic_Social

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ mariuszbit, mgeeky | Mariusz Banach ]

โ˜ข๏ธ Recently we started seeing Threat Actors abusing MSI Windows Installation files for Initial Access & code execution

๐Ÿ”ฅ I now release Part 1 insights into how MSIs can be abused, PoCs for ๐Ÿ”ด & dissection utility for ๐Ÿ”ต

๐Ÿฆ  Let me know what you think!

https://t.co/X7vi6BGQg5

๐Ÿ”— https://mgeeky.tech/msi-shenanigans-part-1/
๐Ÿ”— https://github.com/mgeeky/msi-shenanigans
๐Ÿ”— https://github.com/mgeeky/msidump

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

I've been trying to get NtCreateUserProcess working in C#, but no joy yet. If anyone wants to take a stab at fixing the code, it's here:

https://t.co/ma3iuCSFjj

๐Ÿ”— https://gist.github.com/rasta-mouse/2f6316083dd2f38bb91f160cca2088df

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ M4yFly, Mayfly ]

Finally, the last part of GOAD writeups is done ! ๐Ÿฅณ
Part 12 : Trusts

https://t.co/q6XDr8GTUD

๐Ÿ”— https://mayfly277.github.io/posts/GOADv2-pwning-part12/

๐Ÿฅ [ tweet ]
ะŸะธัะฐะป ั‚ัƒั‚ ะฝะฐ ะบะพะปะตะฝะบะต ัะบั€ะธะฟั‚ ะดะปั ัะฝัƒะผะฐ ััƒั‰ะตัั‚ะฒัƒัŽั‰ะธั… ะตะผะตะนะปะพะฒ ะฝะฐ Mail.ru ั‡ะตั€ะตะท Tor. ะขะตะบัั‚ะพะผ ะฝะต ะพั‚ะดะฐะผ, ะฟั€ะธะดะตั‚ัั ะฟะตั€ะตะฟะธัั‹ะฒะฐั‚ัŒ ๐Ÿ˜†
๐Ÿ”ฅ6
๐Ÿ˜ˆ [ sprocket_ed, ed ]

Not bad - https://t.co/RdbIsLfGRy

๐Ÿ”— https://github.com/m1guelpf/plz-cli

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ4
๐Ÿ˜ˆ [ an0n_r0, an0n ]

what a wonderful technique for stealing chrome/edge cookies without knowing the user password via chrome debug mode by @mangopdf:

https://t.co/T2ct1WI6e3

have not known it before (what a shame๐Ÿ˜„), although it is 4+ yrs old and still working.

here it is, demo using Sliver C2.๐Ÿ”ฅ

๐Ÿ”— https://mango.pdf.zone/stealing-chrome-cookies-without-a-password

๐Ÿฅ [ tweet ]
Forwarded from Offensive Xwitter Eye
๐Ÿ”ฅ5
๐Ÿ˜ˆ [ splinter_code, Antonio Cocomazzi ]

Excited to share my latest research about the Vice Society Ransomware group and the growing threat of custom-branded ransomware! ๐Ÿ”ฅ

https://t.co/5gMHUwBtcS

๐Ÿ”— https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

I pushed all the NtCreateUserProcess stuff to my D/Invoke wiki.

https://t.co/tcv8vKrE86

๐Ÿ”— https://dinvoke.net/en/ntdll/NtCreateUserProcess

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ zux0x3a, Lawrence ๅ‹žๅ€ซๆ–ฏ | ู„ูˆุฑุงู†ุณ ]

https://t.co/iBYhtXgMnn Comprehensive Rust Course

๐Ÿ”— https://google.github.io/comprehensive-rust/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ JulioUrena, Julio Ureรฑa ]

We released the #Kraken

#CrackMapExec module it's ready in @hackthebox_eu #Academy

Thank @mpgn_x64 for building the baseline for this module, helping me out, answering questions, and providing feedback along the way. @mpgn_x64 and #CME Rocks

https://t.co/DbiGMaiE0E

๐Ÿ”— https://academy.hackthebox.com/module/details/84

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1๐Ÿคฏ1
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

(1/2) Despite being busy on an RT engagement, Iโ€™ve also played with the NtCreateUserProcess PoC in C# and if youโ€™ve troubles with spawning the proc, you wanna take a closer look at the attributeList.TotalLength value.

#maldev

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ hasherezade, hasherezade ]

Just a reminder: this is free and doesnโ€™t send anything to a server, nor requires passwords synchronization: https://t.co/4SPywdPC9K

๐Ÿ”— https://hasherezade.github.io/passcrambler/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ ly4k_, Oliver Lyak ]

Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential Guard.

These techniques also work on victims logged on before the server was compromised.

https://t.co/euNIyX2dwW

๐Ÿ”— https://research.ifcr.dk/pass-the-challenge-defeating-windows-defender-credential-guard-31a892eee22

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3