Offensive Xwitter
19.4K subscribers
910 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.me/OffensiveTwitter/546
Download Telegram
😈 [ _nwodtuhs, Charlie β€œShutdown” ]

Wrapping things up and pushing a pull request on Impacket, followed by https://t.co/h6yAdPK5NM guidance on the matter
- Kerberoast trough AS-REQ w/o pre-auth
- Service ticket request through AS-REQ
Again, great work by @exploitph

πŸ”— http://thehacker.recipes

πŸ₯ [ tweet ][ quote ]
πŸ”₯2
😈 [ carlospolopm, carlospolop ]

HackTricks Cloud (or CloudTrick) is finally public:
- https://t.co/VwgVsUKo3x
- https://t.co/kZ9XlHAsJR

Thank you again to all the supporters!
#hacktricks #cloud

πŸ”— https://cloud.hacktricks.xyz/
πŸ”— https://github.com/carlospolop/hacktricks-cloud

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

DumpThatLSASS. Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk
https://t.co/wKgBmr5CR6

πŸ”— https://github.com/D1rkMtr/DumpThatLSASS

πŸ₯ [ tweet ]
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― ]

https://t.co/k3QhNFrV9R

πŸ”— https://github.com/Rvn0xsy/AsmShellcodeLoader

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ aniqfakhrul, Aniq Fakhrul ]

Simple POC on exfiltrating using google translate. Also resolution is πŸ’©, my bad.

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ cnotin, Clément Notin ]

Have you ever wondered how to decrypt β€œencrypted stub data” πŸ” fields in Wireshark when analyzing Kerberos, RPC, LDAP... traffic?
➑️ Ask no more!
https://t.co/dkjidQt6Fv
1. get Kerberos keys
2. give keys to Wireshark in a keytab file
3. get decrypted RPC!
Works with NTLM too πŸ˜‰

πŸ”— https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7

πŸ₯ [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ cube0x0, Cube0x0 ]

How do you work in security without having to talk?

πŸ₯ [ tweet ]

Ρ…Π°ΠΊΠ΅Ρ€ΠΎΠ²-ΠΈΠ½Ρ‚Ρ€ΠΎΠ²Π΅Ρ€Ρ‚ΠΎΠ² Ρ‚Ρ€Π΅Π΄
😈 [ cube0x0, Cube0x0 ]

πŸ₯ [ tweet ]
😈 [ NotMedic, Tim McGuffin ]

I don't know what to do with this knowledge, but today I learned that curl has a handler for LDAP URIs.

curl --user $CREDS "ldaps://ldap.foo.com/DC=ads,DC=foo,DC=com?memberOf?sub?(&(sAMAccountName=$USER)(memberOf=CN=$GROUP,OU=Distribution,OU=Groups,DC=ads,DC=foo,DC=com))"

πŸ₯ [ tweet ]
😈 [ PortSwiggerRes, PortSwigger Research ]

Arbitrary cache poisoning on all Akamai websites via 'Connection: Content-Length' - $50k in bounties well-earned by @jacopotediosi
https://t.co/UmlKIGsgWR

https://t.co/OFHGMVA2gP

πŸ”— https://medium.com/@jacopotediosi/worldwide-server-side-cache-poisoning-on-all-akamai-edge-nodes-50k-bounty-earned-f97d80f3922b
πŸ”— https://blog.hacktivesecurity.com/index.php/2022/09/17/http/

πŸ₯ [ tweet ]
😈 [ C5pider, 5pider ]

The Havoc Framework
https://t.co/eBpOaicsI6

πŸ”— https://github.com/HavocFramework/Havoc

πŸ₯ [ tweet ]

Ρ‚Π°ΠΊ, доТдались сорцов
πŸ”₯3
😈 [ MrUn1k0d3r, Mr.Un1k0d3r ]

You want to use signed PowerShell scripts?

Have a look at all the signed PowerShell scripts located in C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\

Some of these can execute code and do all kind of interesting stuff.

https://t.co/7uBzACJ4JP

#redteam

πŸ”— https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ theluemmel, ADCluemmelSec ]

UPDATES to ADCS blog.
@ly4k_ gave so much input I had to implement.
@n00py1 gave a really good hint for ESC5 with his question.

So here goes:
ESC2 - Update how it works
ESC4 - Automation via Certipy
ESC5 - Full attack path
Bonus - Bloodhound Integration
https://t.co/iWvY9gTIAM

πŸ”— https://luemmelsec.github.io/Skidaddle-Skideldi-I-just-pwnd-your-PKI/

πŸ₯ [ tweet ]