Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ Clement Rouault @hakril ]

In our search for new forensic artifacts at @ExaTrack, we sometimes deep dive into Windows Internals.
This one is about COM and interacting with remote objects using a custom python LRPC Client.

STUBborn: Activate and call DCOM objects without proxy:

πŸ”— https://blog.exatrack.com/STUBborn/

πŸ₯ [ tweet ]
πŸ‘3πŸ”₯1
😈 [ eversinc33 🀍πŸ”ͺβ‹†ο½‘Λš ⋆ @eversinc33 ]

Wanted to learn a bit about the .NET Common Intermediate Language (CIL) and programmatically modifying assemblies, so I wrote a quick automated deobfuscator for @dr4k0nia's XorStringsNet string obfuscator and a mini blog post:

πŸ”— https://eversinc33.com/posts/unxorstringsnet.html

πŸ₯ [ tweet ]
πŸ‘5
😈 [ ap @decoder_it ]

A short and light post on one of my favorite topics: spotting and exploiting GPO misconfigurations, nothing too technical, just the basics! πŸ˜…

πŸ”— https://decoder.cloud/2024/11/08/group-policy-security-nightmares-pt-1/

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Octoberfest7 @Octoberfest73 ]

There are some interesting detections for U2U/UnPAC the hash in certipy/rubues/mimiktaz/impacket based on TGS ticket options. Did some tinkering and by removing a few flags you can shake detection while still recovering the NT hash from a TGT.

πŸ”— https://medium.com/falconforce/falconfriday-detecting-unpacing-and-shadowed-credentials-0xff1e-2246934247ce

πŸ₯ [ tweet ]
πŸ‘8πŸ€”2
Offensive Xwitter
😈 [ Outflank @OutflankNL ] New Blog Alert! 🚨 Introducing Early Cascade Injection, a stealthy process injection technique that targets Windows process creation, avoids cross-process APCs, and evades top-tier EDRs. Learn how it combines Early Bird APC Injection…
😈 [ 5pider @C5pider ]

Reimplemented the Early Cascade Injection technique documented by the @OutflankNL team

The code is boring but the blog post was very interesting to read, especially when it came to how the process is initialized and how LdrInitializeThunk works. Cheers

πŸ”— https://github.com/Cracked5pider/earlycascade-injection

πŸ₯ [ tweet ]
πŸ”₯4πŸ₯±3πŸ‘2
😈 [ Usman Sikander @UsmanSikander13 ]

7 Methods to dump lsass memory. This is a powerful tool provide users an option to extract data from lsass memory.

πŸ”— https://github.com/Offensive-Panda/ShadowDumper

πŸ₯ [ tweet ]
πŸ‘7πŸ₯±2πŸ”₯1🍌1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Rtl Dallas @RtlDallas ]

KrakenMask is back with more opsec

πŸ”— https://github.com/NtDallas/KrakenMask

πŸ₯ [ tweet ]
πŸ”₯7
😈 [ 7eRoM @7eRoM ]

While verifying the PE digital signature in Windows kernel, I encountered several new terms and concepts, such as PKCS7, ASN.1, calculating the thumbprint, and verifying signatures.

πŸ”— https://github.com/7eRoM/tutorials/tree/main/Verifying%20Embedded%20PE%20Signature

πŸ₯ [ tweet ]
πŸ‘4πŸ₯±1
😈 [ Steven @0xthirteen ]

I’ve always thought Seatbelt was a great situational awareness tool, I created a python implementation of it. Due to the nature of how I expect it to run, it only implements the remote modules, but I hope someone finds it useful.

πŸ”— https://github.com/0xthirteen/Carseat

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ mpgn @mpgn_x64 ]

If you want to first blood a windows box in @hackthebox_eu every minute counts ! 🩸
I've added a special flag --generate-hosts-file so you just have to copy past into your /etc/hosts file and be ready to pwn as soon as possible πŸ”₯

πŸ₯ [ tweet ]
πŸ‘7πŸ”₯4😁4
😈 [ drm @lowercase_drm ]

TIL you can ask the DC to resolve a foreign security principal by querying the msds-principalname (hidden) attribute. The DC will use the trust secret to perform authentication against the foreign domain and then call LsarLookupSids3 (so it even works with selective auth).

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Octoberfest7 @Octoberfest73 ]

This is a neat blog post on some of the new features in the 4.10 release of Cobalt Strike from @RWXstoned

πŸ”— https://rwxstoned.github.io/2024-11-13-Cobalt-Strike-customization/

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ Zerotistic @gegrgtezrze ]

Excited to share my latest blog post: "Breaking Control Flow Flattening: A Deep Technical Analysis"

I showcase usage of formal proofs and graph theory to automate CFF deobfuscation, among other things !
Might make it a talk...? πŸ‘€

πŸ”— https://zerotistic.blog/posts/cff-remover/

πŸ₯ [ tweet ]
🀯2😁1
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ NetSPI @NetSPI ]

Introducing PowerHuntShares 2.0 Release!

NetSPI VP of Research @_nullbind introduces new insights, charts, graphs, & LLM capabilities that can be used to map the relationships & risks being exposed through the network shares:

πŸ”— https://www.netspi.com/blog/technical-blog/network-pentesting/powerhuntshares-2-0-release/

πŸ₯ [ tweet ]
πŸ”₯5πŸ₯±3πŸ‘1
😈 [ John Hammond @_JohnHammond ]

Supply chain malware from an infected game mod 🀯😱 Long-form reverse engineering and a WILD ride: Binary Ninja, x64dbg, 010 Editor, PEB walking, reworking API function hashing in Python, DLL search-order hijacking, hooked functions & more. MASSIVE video:

πŸ”— https://youtu.be/bvyklJ5Wie0?si=c0TSvALbx1ch21rZ

πŸ₯ [ tweet ]
πŸ”₯11πŸ‘5
😈 [ Lefteris Panos @lefterispan ]

Wrote a small C# tool that is able to make a network token using a certificate. Comes handy in RTs ;)

πŸ”— https://github.com/nettitude/TokenCert

πŸ₯ [ tweet ][ quote ]
πŸ”₯7πŸ₯±2
😈 [ NCV @nickvourd ]

I just published Local Admin In Less Than 60 Seconds (Part 1)

In this post, I present Part 1 of my latest @BSidesAth presentation. I hope you enjoy it πŸ˜ƒ

PS: There are Easter eggs inside for @taso_x, @tkalahan, and of course, @S1ckB0y1337.

πŸ”— https://medium.com/@nickvourd/local-admin-in-less-than-60-seconds-part-1-e2a0c0102b99

πŸ₯ [ tweet ]
πŸ‘4
Offensive Xwitter
😈 [ Lefteris Panos @lefterispan ] Wrote a small C# tool that is able to make a network token using a certificate. Comes handy in RTs ;) πŸ”— https://github.com/nettitude/TokenCert πŸ₯ [ tweet ][ quote ]
😈 [ freefirex @freefirex2 ]

Saw some other folks realize its actually really easy to use certificates to authenticate as other users on windows if you have access to the API.

We're now releasing our previously internal make_token_cert bof to auth using only a .pfx file :)

πŸ”— https://github.com/trustedsec/CS-Remote-OPs-BOF/blob/bc0cdd7997ebbf37a1cfee26be97eb3faa06ab50/src/Remote/make_token_cert/entry.c#L69

πŸ₯ [ tweet ]
πŸ‘9
😈 [ Daniel @0x64616e ]

Hash-based driver blocklists are insecure, because of how Authenticode signatures are computed. Nothing new, but not as well known as it should be.

πŸ”— https://github.com/akkuman/gSigFlip

πŸ₯ [ tweet ]
πŸ”₯10