Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ d3lb3_, Julien Bedel ]

(2/3) If you are interested in the subject, make sure to have a look at @quarkslab's article. It demonstrate how to abuse KeePass plugin cache's access right and load DLLs in a low privilege context.

https://t.co/xHTqby9xO9

πŸ”— https://blog.quarkslab.com/post-exploitation-abusing-the-keepass-plugin-cache.html

πŸ₯ [ tweet ]
πŸ€”1
😈 [ an0n_r0, an0n ]

a nice benchmark of subdomain enumeration tools by @BlackLanternLLC

https://t.co/k4qKJyRs5Q

πŸ”— https://blog.blacklanternsecurity.com/p/subdomain-enumeration-tool-face-off

πŸ₯ [ tweet ]
😈 [ _EthicalChaos_, CCob🏴󠁧󠁒󠁷󠁬󠁳󠁿 ]

Now I can relax. My first public talk competed at @BSidesCymru, my home town. Here's are the slides and the POC released as part of the talk for those who couldn't make it in person https://t.co/j8Tf9r6cwd

πŸ”— https://github.com/CCob/ThreadlessInject

πŸ₯ [ tweet ]
😈 [ dec0ne, Mor Davidovich ]

Me and @idov31 are happy to introduce HWSyscalls, a new method to execute indirect syscalls using Hardware Breakpoints without calling directly to ntdll.dll, therefore bypassing the current way to detect it.
A detailed blog post will follow soon.
https://t.co/4u9DI7U4pX

πŸ”— https://github.com/Dec0ne/HWSyscalls/

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ BlackArrowSec, BlackArrow ]

Windows Local Privilege Escalation via StorSvc service (writable SYSTEM path DLL search order Hijacking) /cc @antuache @_Kudaes_

➑️ https://t.co/8XMvewhgFn

πŸ”— https://github.com/blackarrowsec/redteam-research/tree/master/LPE%20via%20StorSvc

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ splinter_code, Antonio Cocomazzi ]

Cool discovery 😎
Can be used also to weaponize arbitrary file write vulnerabilities.
As a bonus, check the screenshot on how to weaponize #LocalPotato with this StorSvc DLL hijacking to get a SYSTEM shell.

πŸ₯ [ tweet ][ quote ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[BLOG πŸ“] Some notes on how to automate the generation of Position Independent Shellcodes (without msfvenom windows/x64/exec) from object files in memory (by @NinjaParanoid) to be used in Threadless Process Injection (by @_EthicalChaos_) ⬇️

https://t.co/OFdHn7lR7I

πŸ”— https://snovvcrash.rocks/2023/02/14/pic-generation-for-threadless-injection.html

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Threatlabz, Zscaler ThreatLabz ]

πŸ•΅οΈZscaler ThreatLabz has observed a campaign targeting a government organization with a new post exploitation framework named #Havoc. During this attack, the threat actors have made several #opsec failures: https://t.co/TcupRUwAYi

IOCs are available here: https://t.co/PD8vP73AKV

πŸ”— https://www.zscaler.com/blogs/security-research/havoc-across-cyberspace
πŸ”— https://github.com/threatlabz/iocs/tree/main/havoc

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ D1rkMtr, D1rkMtr ]

Github as C2 Demonstration , free API = free C2 Infrastructure
https://t.co/cZc2RtAJxn

πŸ”— https://github.com/TheD1rkMtr/GithubC2

πŸ₯ [ tweet ]
😈 [ PortSwiggerRes, PortSwigger Research ]

Server-side prototype pollution: Black-box detection without the DoS

https://t.co/6guKOcUmdS

πŸ”— https://portswigger.net/research/server-side-prototype-pollution

πŸ₯ [ tweet ]
😈 [ _zblurx, Thomas Seigneuret ]

https://t.co/1AxsR43O5Z
In order to learn Rust, I made a complete rewrite of @Defte_ Impersonate in plain Rust, and thanks to @g0h4n_0 it is now also usable as a dependency in your Rust projects (and he also made my code readable tho).

πŸ”— https://github.com/zblurx/impersonate-rs

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ EmpireC2Project, Empire ]

How about pop-out windows and a process tab? Only 6 more days until Empire 5.0.

πŸ₯ [ tweet ]

выглядит ΠΊΡ€ΡƒΡ‚ΠΎ, ΠΊΠΎΠ½Π΅Ρ‡Π½ΠΎ, Π½ΠΎ Ρ‚Π°ΠΊΠΎΠΉ ΠΎΠ½ Β«ΠΈΠ³Ρ€ΡƒΡˆΠ΅Ρ‡Π½Ρ‹ΠΉΒ» всС-Ρ‚Π°ΠΊΠΈ
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Feeling guilty about steeling #DInvoke version of #RunPE from @_RastaMouse’s #SharpC2 for DInjector, but man this looks so πŸ”₯🀀

πŸ₯ [ tweet ][ quote ]
πŸ”₯5
😈 [ 0x6d69636b, Michael Schneider ]

I wrote about the Microsoft Defender configuration with Microsoft Intune and what's different compared to GPO.

Surprise: Non-admin users can read exclusion lists! https://t.co/50zkrFKkSC

πŸ”— https://www.scip.ch/en/?labs.20230216

πŸ₯ [ tweet ]
😈 [ decoder_it, ap ]

Short blog post on security issue in Windows group policy processing, fixed in CVE-2022-37955 https://t.co/fhoYftdOhQ

πŸ”— http://decoder.cloud/2023/02/16/eop-via-arbitrary-file-write-overwite-in-group-policy-client-gpsvc-cve-2022-37955/

πŸ₯ [ tweet ]
😈 [ pdiscoveryio, ProjectDiscovery.io ]

Our very own @olearycrew is new to the security engineering game - but he was able to use ProjectDiscovery tools to get his first bug bounty (from a Fortune 50 company no less).

Learn how: https://t.co/G64avj7AFM

#hackwithautomation #pdteam

πŸ”— https://blog.projectdiscovery.io/using-pd-tools-to-find-my-first-subdomain-takeover/

πŸ₯ [ tweet ]