Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Outflank @OutflankNL ]

Let's explore the intricate dance of virtual to physical memory mapping in BYOVD tooling development! πŸ’»

In @c3c's latest blog we delve into resolving addresses using Superfetch, unlocking control over physical memory.

Dive into the details now πŸ‘‰

πŸ”— https://outflank.nl/blog/2023/12/14/mapping-virtual-to-physical-adresses-using-superfetch/

πŸ₯ [ tweet ]
πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‘8
😈 [ Dylan Tran @d_tranman ]

Wrote up on module stomping and modding AceLdr to implement it at rest

πŸ”— https://dtsec.us/2023-11-04-ModuleStompin/

πŸ₯ [ tweet ]
😈 [ LuemmelSec @theluemmel ]

One Box To Rule Them All

Little write up of my way to tackle remote pentesting situations with a dropbox.

This is about non covert systems that will allow you to carry out full fledged pentests when implanted into the customers network.

πŸ”— https://luemmelsec.github.io/One-Box-To-Rule-Them-All/

πŸ₯ [ tweet ]
πŸ€”1
😈 [ S3cur3Th1sSh1t @ShitSecure ]

My talk β€œPlaying Chess as Red Teams” from @MCTTP_Con got published now:

πŸ”— https://youtu.be/XAvAVKXXC_8?si=W2UKCYYd0Ukf3sDF

πŸ₯ [ tweet ]
πŸ”₯4
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Jonny Johnson @jsecurity101 ]

Today I am releasing PowerParse. This is a PE Parser I've created that has helped me in the past perform initial triage on malware. I'll provide some examples in the threads below.

πŸ”— https://github.com/jsecurity101/PowerParse

πŸ₯ [ tweet ]
πŸ‘1
😈 [ ed @sprocket_ed ]

Blog coming soon... #ffuf

πŸ”— https://github.com/puzzlepeaches/ffufw

πŸ₯ [ tweet ]

Ρ‡Ρ‚ΠΎ-Ρ‚ΠΎ интСрСсноС..?
πŸ₯±3πŸ€”1
😈 [ Akamai Security Intelligence Group @akamai_research ]

Did you hear that?

Akamai researcher @nachoskrnl has discovered two vulnerabilities within Windows.

Leveraging the infamous custom reminder sound feature, these can be chained together to achieve full 0-click RCE against Outlook.

Full write-up:

πŸ”— https://www.akamai.com/blog/security-research/2023/dec/chaining-vulnerabilities-to-achieve-rce-part-one

πŸ₯ [ tweet ]
Нравится dns-Ρ‚ΡƒΠ»ΠΊΠΈΡ‚ ΠΌΠ½ΠΎΠ³ΠΎΡƒΠ²Π°ΠΆΠ°Π΅ΠΌΠΎΠ³ΠΎ @s0i37, Π½ΠΎ я всС врСмя Π·Π°Π±Ρ‹Π²Π°ΡŽ, ΠΊΠ°ΠΊ Ρ‚Π°ΠΌ ΠΏΡ€Π°Π²ΠΈΠ»ΡŒΠ½ΠΎ Π½Π°ΡΡ‚Ρ€Π°ΠΈΠ²Π°Ρ‚ΡŒ записи ΠΈ Ρ‡Ρ‚ΠΎ ΠΌΠ΅Π½ΡΡ‚ΡŒ Π² ΠΊΠΎΠ΄Π΅, поэтому Ρ„ΠΎΡ€ΠΊΠ½ΡƒΠ» с QoL-ΠΌΠΎΠ΄Π°ΠΌΠΈ для dns_upload.py:

* Π”ΠΎΠΌΠ΅Π½ ΠΌΠΎΠΆΠ½ΠΎ ΡƒΠΊΠ°Π·Ρ‹Π²Π°Ρ‚ΡŒ Π² Π²ΠΈΠ΄Π΅ Π°Ρ€Π³ΡƒΠΌΠ΅Π½Ρ‚Π°.
* Π”ΠΎΠ±Π°Π²ΠΈΠ» ΠΊΡ€Π΅Π΄Π» Π½Π° PS, ΠΏΠΎΡ‚ΠΎΠΌΡƒ Ρ‡Ρ‚ΠΎ ΡΠΏΠ°Π²Π½ΠΈΡ‚ΡŒ 100500 child-процСссов nslookup.exe ΠΈΠ· VBS Π½Π΅ всСгда ΠΊΠΎΠΌΠΈΠ»ΡŒΡ„ΠΎ.
* Π’ ΠΈΠ΄Π΅Π°Π»Π΅ Π»ΡƒΡ‡ΡˆΠ΅ ΠΎΠ±Ρ€Π°Ρ‰Π°Ρ‚ΡŒΡΡ ΠΊ стороннСму сСрвСру для Ρ€Π΅Π·ΠΎΠ»Π²Π°, ΠΏΠΎΡ‚ΠΎΠΌΡƒ Ρ‡Ρ‚ΠΎ ΠΊΠ»ΠΈΠ΅Π½Ρ‚Ρ‹ ΠΌΠΎΠ³ΡƒΡ‚ ΠΊΠ΅ΡˆΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ записи ΠΎΡ‚ ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½Ρ‹Ρ… DNS-ΠΎΠ², Ρ‡Ρ‚ΠΎ ΠΌΠΎΠΆΠ΅Ρ‚ привСсти ΠΊ Π½Π΅ΠΊΠΎΡ€Ρ€Π΅ΠΊΡ‚Π½ΠΎΠΉ сборкС Π·Π°Π³Ρ€ΡƒΠΆΠ°Π΅ΠΌΡ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ….

πŸ”— https://github.com/snovvcrash/exfiltrate
πŸ‘7
Offensive Xwitter
😈 [ Akamai Security Intelligence Group @akamai_research ] Turns out, sometimes it isn't DNS... it's DHCP πŸ‘€ See @oridavid123's research on how DHCP can be used to spoof DNS records- potentially leading to Active Directory compromise. Worst part? No credentials…
😈 [ Akamai Security Intelligence Group @akamai_research ]

Earlier this month we released research by @oridavid123 on using DHCP to spoof DNS. But wait, there's more!

We are proud to release DDSpoof: a Python-based tool that enables red and blue teams to perform and study DHCP DNS attacks.

Learn how to use it:

πŸ”— https://www.akamai.com/blog/security-research/weaponizing-dhcp-dns-spoofing-hands-on-guide?filter=123

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Grzegorz Tworek @0gtweet ]

Do you store your "DNS dynamic update registration credentials" in a DHCP?
Cute, it means I have a new tool for you 😁😈
Enjoy the DHCP Server DNS Password Stealer. The C source code, and the compiled exe, as usual:

πŸ”— https://github.com/gtworek/PSBits/tree/master/PasswordStealing/DHCP

πŸ₯ [ tweet ]
🀯2πŸ”₯1
😈 [ Synacktiv @Synacktiv ]

One of our ninjas (@_ixty_) wrote a series of articles explaining how to write a win32 keylogger that supports all input languages (that don't use input method editors). Here is the first part which focuses on capturing keyboard events!

πŸ”— https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-13

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ rvrsh3ll @424f424f ]

@chvancooten is a certified #OST badass 🫑

πŸ”— https://github.com/cobbr/Covenant/issues/391#issuecomment-1859177527

πŸ₯ [ tweet ]

смСшнявка
😁8πŸ‘1πŸ₯±1
😈 [ V❄️ @vincenzosantuc1 ]

What's better for Christmas than a nice read about Reflective DLL Injection? πŸŽ„

πŸ”— https://oldboy21.github.io/posts/2023/12/all-i-want-for-christmas-is-reflective-dll-injection/

#reflectivedll #oldbutgold #cplusplus #code #belloblog

πŸ₯ [ tweet ]
πŸ‘5😁2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Alex neff @al3x_n3ff ]

A small gift: NetExec now supports Tab-Completion 🎁
Made by @Adamkadaban

Merry Christmas!πŸŽ„

πŸ₯ [ tweet ]
πŸ”₯10πŸ₯±1
😈 [ Ido Veltzman @Idov31 ]

There was no update for a while and the reason being a massive bug fixes, feature checking and a new feature (fun fact: it is the 23th feature!).
Now, you can use Nidhogg to dump credentials from LSASS!
Go check it out:

πŸ”— https://github.com/Idov31/Nidhogg/tree/dev

#infosec #CyberSecurity

πŸ₯ [ tweet ]
πŸ‘3😁3
😈 [ bohops @bohops ]

I guess all Microsoft signed debuggers and tracers are execute lolbins by nature, so here is another:

dotnet-trace.exe collect -- <cmd arg...>


If the process is not a .net program, dotnet-trace will kill the direct child process after a few seconds.

πŸ₯ [ tweet ]
πŸ”₯7πŸ‘1
😈 [ an0n @an0n_r0 ]

OST cannot be stopped. Here is a technique we tested internally 9 months ago: blocking EDR telemetry by leveraging the Windows Filtering Platform. Considered it so evil that we didn't publish it that time. It was pointless, now here it is by @netero_1010:

πŸ”— https://github.com/netero1010/EDRSilencer

πŸ₯ [ tweet ]
πŸ”₯2
πŸŽ„πŸŽ„πŸŽ„
πŸ”₯13😁1