Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ Scott Sutherland @_nullbind ]

[BLOG] Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation

πŸ”— https://www.netspi.com/blog/technical-blog/network-pentesting/hijacking-sql-server-credentials-with-agent-jobs-for-domain-privilege-escalation/

πŸ₯ [ tweet ]
πŸ”₯5πŸ₯±1
😈 [ lazarusholic @lazarusholic ]

"Fake recruiter coding tests target devs with malicious Python packages" published by ReversingLabs.

πŸ”— https://www.reversinglabs.com/blog/fake-recruiter-coding-tests-target-devs-with-malicious-python-packages

πŸ₯ [ tweet ]
😁3πŸ€”2
😈 [ Pen Test Partners @PenTestPartners ]

Discover how our @_EthicalChaos_ edited Group Policy Objects (GPOs) without being tied to a domain-joined system πŸ” This technical blog explores the challenges of manipulating GPOs from non-domain environments using native Windows tools β€” minimising IOCs and maximising stealth in your red teaming efforts πŸ”΄

@_EthicalChaos_ details the process of manipulating the Group Policy Manager MMC snap-in, diving into debugging techniques, function manipulation, and the strategic use of hooks to bypass typical domain checks.

Discover how to intercept and modify critical functions like GetUserNameExW to bypass domain checks and tackle further complexities in the Group Policy Editor using hooks with the DGPOEdit tool, which @_EthicalChaos_ has put on GitHub for free.

This blog covers the technical barriers, API call modifications, and the challenges in creating a seamless experience with native toolingβ€”without compromising operational security. Perfect for those looking to leverage native Windows tools in their red teaming arsenal, this guide provides detailed insights into pushing beyond the limitations of standard approaches.

πŸ› οΈ Look at @_EthicalChaos_ methods and get access to the free DGPOEdit tool from the full blog now.

Read it here:
πŸ”— https://www.pentestpartners.com/security-blog/living-off-the-land-gpo-style/

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘4😁1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ konrad @konradgajdus ]

I made a donut using the C standard library:

πŸ”— https://github.com/konrad-gajdus/donut

πŸ₯ [ tweet ]

красивоС
🍌15πŸ₯±6πŸ‘4🀯2πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ JiΕ™Γ­ Vinopal @vinopaljiri ]

Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be:

Executed as a normal #exe
Loaded as #dll + export function can be invoked
Run via "rundll32.exe"
Executed as #shellcode right from the DOS (MZ) header that works as polyglot stub

πŸ”— https://github.com/Dump-GUY/EXE-or-DLL-or-ShellCode

πŸ₯ [ tweet ]
πŸ‘5πŸ€”1
😈 [ Sam ☁️πŸͺ΅ @Sam0x90 ]

Interesting ZIP trick with __Macosx__ folder and LNK executing ftp script to execute embedded pythonw.exe

zip > docx LNK > ftp.exe > disguised pythonw.exe > CS shellcode

πŸ”— https://www.ctfiot.com/203334.html

πŸ₯ [ tweet ]
πŸ‘10
😈 [ Het Mehta @hetmehtaa ]

Reversing a VPN client to hijack sessions

πŸ”— https://rotarydrone.medium.com/decrypting-and-replaying-vpn-cookies-4a1d8fc7773e

πŸ₯ [ tweet ]
πŸ”₯9
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ John Hammond @_JohnHammond ]

Well, this was a stupid insomnia project, but... πŸ˜‚

Playground code is here:

πŸ”— https://github.com/JohnHammond/recaptcha-phish

πŸ₯ [ tweet ][ quote ]

Π·Π°Π²ΠΈΡ€ΡƒΡΠΈΠ»ΠΎΡΡŒ, ΠΏΡ€ΠΈΠΊΠΎΠ»ΡŒΠ½ΠΎ
😁18πŸ‘1πŸ₯±1
Offensive Xwitter
😈 [ JiΕ™Γ­ Vinopal @vinopaljiri ] Inspired by @0gtweet, I created PoC: EXE-or-DLL-or-ShellCode that can be: Executed as a normal #exe Loaded as #dll + export function can be invoked Run via "rundll32.exe" Executed as #shellcode right from the DOS (MZ) header…
😈 [ Kurosh Dabbagh @_Kudaes_ ]

Somebody asked if you can run a dll directly without rundll32 as you would do with an exe. You just need to remove the IMAGE_FILE_DLL flag from IMAGE_FILE_HEADER->Characteristics, which can be done with the option -e. Don't see much use for it tho ^^

πŸ”— https://github.com/Kudaes/CustomEntryPoint

πŸ₯ [ tweet ]
πŸ‘18
😈 [ Usman Sikander @UsmanSikander13 ]

Basics to advanced process injection. Covering 25 techniques:

πŸ”— https://github.com/Offensive-Panda/ProcessInjectionTechniques

πŸ₯ [ tweet ]
πŸ‘14
😈 [ Aleem Ladha @LadhaAleem ]

I've fully automated the lab used for @_leHACK_ Active Directory 2024 workshop done by @mpgn_x64 and it's available for everyone ! πŸ”₯
Also big kudos to @M4yFly for the playbooks and NetExec dev teams for this awesome tool !
Hope you enjoy, more to come

πŸ”— https://github.com/Pennyw0rth/NetExec-Lab

πŸ₯ [ tweet ]
πŸ‘9πŸ”₯7πŸ€”2🀯2
😈 [ Koen Van Impe β˜• @cudeso ]

Interesting approach shared by @Wietze on manipulating argv[0] to mislead security tools and analysts. A clever tactic for obfuscation!

πŸ”— https://www.wietzebeukema.nl/blog/why-bother-with-argv0

πŸ₯ [ tweet ]
πŸ‘12πŸ”₯1🀯1
😈 [ Nikhil Hegde @ka1do9 ]

In this one, I go into great detail about how malware walks the Process Environment Block (PEB) to find particular DLLs and parses their export table to find address of functions.

πŸ”— https://nikhilh-20.github.io/blog/peb_phobos_ransomware/

πŸ₯ [ tweet ]
πŸ‘9πŸ”₯6
😈 [ Justin Elze @HackingLZ ]

Pwning C2 frameworks

πŸ”— https://blog.includesecurity.com/2024/09/vulnerabilities-in-open-source-c2-frameworks/

πŸ₯ [ tweet ]
πŸ‘6πŸ”₯3
😈 [ konrad @konradgajdus ]

From Theory to Code: Implementing a Neural Network in 200 Lines of C

πŸ”— http://x.com/i/article/1837064930832404482

πŸ₯ [ tweet ]
🀯3
😈 [ Orange Cyberdefense Switzerland @orangecyberch ]

πŸ’»πŸ›‘οΈ In this series of blog posts, ClΓ©ment Labro (itm4n) one of our ethical hacker, explores yet another avenue for bypassing LSA Protection in Userland.

Blog series:
πŸ”— https://itm4n.github.io/ghost-in-the-ppl-part-1/
πŸ”— https://itm4n.github.io/ghost-in-the-ppl-part-2/
πŸ”— https://itm4n.github.io/ghost-in-the-ppl-part-3/

Code:
πŸ”— https://github.com/itm4n/PPLrevenant
πŸ”— https://github.com/itm4n/Pentest-Windows/tree/main/NdrServerCallAll

πŸ₯ [ tweet ]
πŸ‘10πŸ”₯3
😈 [ Remko Weijnen @RemkoWeijnen ]

Proof of Concept to leverage Windows App to create an LSASS dump

πŸ”— https://github.com/rweijnen/createdump

πŸ₯ [ tweet ]
πŸ₯±5πŸ”₯4πŸ‘1
😈 [ DSAS by INJECT @DevSecAS ]

Recursive Loader

Explanation of code: The following code is inspired by APT Linux/Kobalos. Kobalos was malware, suspected to be tied to the Chinese government, which was fully recursive. It was novel malware.

πŸ”— https://github.com/Evi1Grey5/Recursive-Loader

πŸ₯ [ tweet ]
πŸ‘11
😈 [ Will @BushidoToken ]

I am happy to share another new resource I recently made called The Russian APT Tool Matrix πŸ‡·πŸ‡Ί

πŸ”— https://blog.bushidotoken.net/2024/09/the-russian-apt-tool-matrix.html
πŸ”— https://github.com/BushidoUK/Russian-APT-Tool-Matrix

πŸ₯ [ tweet ]

ΠΈΡ‰Π΅ΠΌ сСбя, ΠΏΠ°Ρ†Π°Π½Ρ‹
πŸ‘8πŸ₯±6😁3🍌3😒1