Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ n00py @n00py1 ]

The craziest BloodHound art I've made yet (password sharing clusters)

πŸ₯ [ tweet ]

ΠΏΠ»Π°Π³ΠΈΠ°Ρ‚ - ΠΎΡ‡Π΅Π²ΠΈΠ΄Π½ΠΎ ΠΆΠ΅, Ρ‡Ρ‚ΠΎ это Волосатый Π±ΡƒΠ±Π»ΠΈΠΊ
πŸ”₯6
😈 [ Almond OffSec @AlmondOffSec ]

Understanding the different types of LDAP authentication methods is fundamental to apprehend subjects such as relay attacks or countermeasures. This post by @lowercase_drm introduces them through the lens of Python libraries.

πŸ”— https://offsec.almond.consulting/ldap-authentication-in-active-directory-environments.html

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ sinusoid @the_bit_diddler ]

Ever wanted to create Defender exclusions non-interactively?

Support for local and remote systems? βœ”οΈ
Ability to revert said changes? βœ”οΈ
Support processes, paths, and extensions? βœ”οΈ
BOF? βœ”οΈ
C# βœ”οΈ

Code is public:

πŸ”— https://github.com/EspressoCake/DefenderPathExclusions
πŸ”— https://github.com/EspressoCake/Defender-Exclusions-Creator-BOF

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Craig Rowland - Agentless Linux Security @CraigHRowland ]

Daily Linux whoami:

$(echo -e "\x2f\x75\x73\x72\x2f\x62\x69\x6e\x2f\x77\x68\x6f\x61\x6d\x69")


πŸ₯ [ tweet ]
😁5πŸ”₯1
Offensive Xwitter
😈 [ Antonio Cocomazzi @splinter_code ] Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe πŸ‘† πŸ₯ [ tweet ]
😈 [ Geiseric @Geiseric4 ]

Following @splinter_code idea, you can also start RemoteRegistry remotely. This way you can check on which server DAs are connected, in case you want dump their creds. This script could help:
It works from low privileged user πŸ˜‰

πŸ”— https://gist.github.com/GeisericII/6849bc86620c7a764d88502df5187bd0

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ Thomas Seigneuret @_zblurx ]

New feature in #NetExec : S4U2Self and S4U2Proxy support and automation with --delegate and --self

It allows you to abuse KCD with protocol transition and RBCD automatically in NetExec, and use directly all the postex functionalities πŸ”₯

For example with RBCD πŸ‘†πŸ»

πŸ₯ [ tweet ]
πŸ”₯8πŸ‘1
😈 [ Grzegorz Tworek @0gtweet ]

By-design AV bypass with "dev drive" πŸ˜…
I really like this feature!
Update your detection rules if you want to spot this...

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Antonio Cocomazzi @splinter_code ]

The slides of our joint research talk β€œ10 Years of Windows Privilege Escalation with Potatoes” at #POC2023 are out!

cc @decoder_it

πŸ”— https://github.com/antonioCoco/infosec-talks/blob/main/10_years_of_Windows_Privilege_Escalation_with_Potatoes.pdf

πŸ₯ [ tweet ]
πŸ”₯7
😈 [ ΡƒΟ…Ξ·g ՏΝА΀ @yunginnanet ]

this was meant to be a simple debugging tool, but ended up being a full barebones, concurrent RFC1928 (SOCKS5) server. unnecessarily fast, very simple.

gophers that are interested in learning SOCKS5 protocol may find this useful (hopefully someone does)

πŸ”— https://gist.github.com/yunginnanet/c84f831a4ac39eada5609ce0319f8d54

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ 5pider @C5pider ]

LdrLibraryEx.
A small x64 library to load PEs into memory.

πŸ”— https://github.com/Cracked5pider/LdrLibraryEx

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Charlie Clark @exploitph ]

Finally updated my RitM tool with the DES TGT session roasting code if anyone is interested.

Reminder, this isn't intended to be attack-ready code!

The attack is described in detail in my DES post (currently pinned to my profile).

πŸ”— https://github.com/0xe7/RoastInTheMiddle/pull/1

πŸ₯ [ tweet ]

спасибо @Michaelzhm, Ρ‡Ρ‚ΠΎ ΠΏΠ½ΡƒΠ» πŸ˜…
πŸ”₯4πŸ‘1😁1
😈 [ S4ntiagoP @s4ntiago_p ]

πŸ”₯ New blogpost πŸ”₯
Running PEs inline without a console.
You now can, for example, run PowerShell in CobaltStrike and obtain its output without spawning any process (including conhost.exe)

πŸ”— https://www.coresecurity.com/core-labs/articles/running-pes-inline-without-console

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ S3cur3Th1sSh1t @ShitSecure ]

Today I needed to decrypt Veeam stored credentials. As existing toolings failed and/or manual decryption for a lot of passwords was too much effort I wrote a small assembly to do the whole job:

πŸ”— https://github.com/S3cur3Th1sSh1t/SharpVeeamDecryptor

πŸ₯ [ tweet ]
πŸ‘3πŸ”₯1
😈 [ Rémi GASCOU (Podalirius) @podalirius_ ]

In my latest article, discover the depth of the msDS-KeyCredentialLink attribute used in ShadowCredentials attacks and how to parse it. Plus, discover a Python library, pydsinternals, that simplifies the parsing process.

Check it out ‡️

πŸ”— https://podalirius.net/en/articles/parsing-the-msds-keycredentiallink-value-for-shadowcredentials-attack/

πŸ₯ [ tweet ]
πŸ‘2
😈 [ an0n @an0n_r0 ]

playing against an #AV/#EDR: when almost everything failed, finally, loaded @chvancooten's #NimPlant using my custom stager based on @hasherezade's libPeConv and managed to execute what I wanted, #Rubeus with built-in execute-assembly (#AMSI bypass + #ETW block). never give up :)

πŸ₯ [ tweet ]

Π° ΠΊΡ‚ΠΎ сдСлал-Ρ‚ΠΎ execute-assembly Π° Π° Π°
πŸ‘7πŸ€”1
😈 [ Matt Creel @Tw1sm ]

New post πŸ‘‡

Taking a look at compromising Slack access on both Windows and macOS. New BOF included!

πŸ”— https://posts.specterops.io/abusing-slack-for-offensive-operations-part-2-19fef38cc967

πŸ₯ [ tweet ]
πŸ”₯2