Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

A short story of extracting KeePassXC passphrase from memory using strings. Providing the resulting dump of strings as a wordlist to hashcat (13400) I cracked the database in a few seconds 😐

πŸ₯ [ tweet ]
😈 [ C5pider, 5pider ]

What an amazing video from @33y0re explaining modern Windows Kernel Exploitation. Going to start my journey of learning kernel exploit dev soon and this video explained a lot of things. https://t.co/BltKS0XZQp

πŸ”— https://www.youtube.com/watch?v=nauAlHXrkIk

πŸ₯ [ tweet ]
😈 [ 0xdf_, 0xdf ]

Shared from @hackthebox_eu has SQL injection in a cookie, iPython exploitation, some basic reverse enginnering, and Redis exploitation.

https://t.co/1ayMOYjPOw

πŸ”— https://0xdf.gitlab.io/2022/11/12/htb-shared.html

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

Play with the ad lab goadv2 - part 10 : delegations
- constrained
- unconstrained (with and without protocol transition)
- resource based

https://t.co/47zFWSD7G9

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part10/

πŸ₯ [ tweet ]
😈 [ CaptMeelo, Meelo ]

Here's the tool that I demoed during my #SANSHackFest talk. Let's make it better by filing any issues you identified and submitting PRs.
#redteam #maldev
https://t.co/KvCJzVwSxi

πŸ”— https://github.com/capt-meelo/laZzzy

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

CrackMapExec version 5.4.0 "Indestructible G0thm0g" is out for everyone and also available in @kalilinux πŸŽ‰

➑️ apt update
➑️ apt install crackmapexec

Happy Hacking ! πŸ”₯πŸͺ‚

Release blog post πŸ”½
https://t.co/gtOA7tt8Ey

πŸ”— https://wiki.porchetta.industries/news-2022/indestructible-g0thm0g

πŸ₯ [ tweet ]
😈 [ dec0ne, Mor Davidovich ]

Happy to share a new blog post I wrote about how I managed to dump LSASS undetected using a simple MiniDumpWriteDump against some of the most advanced EDRs in the market.

"It’s all in the details: The curious case of an LSASS dumper gone undetected"

https://t.co/YoDUW8LwKy

πŸ”— https://dec0ne.github.io/research/2022-11-14-Undetected-Lsass-Dump-Workflow/

πŸ₯ [ tweet ]
😈 [ cerbersec, Cerbersec ]

Here are the #SANSHackFest demos for my Kernel Karnage talk!

WinDbg: https://t.co/RicezA3tkG
Full attack chain: https://t.co/spIcXE27Wk

πŸ”— https://youtu.be/QHEzyCGz-rk
πŸ”— https://youtu.be/EQqxQk7ytjw

πŸ₯ [ tweet ]
😈 [ _EthicalChaos_, Ceri 🏴󠁧󠁒󠁷󠁬󠁳󠁿 ]

Just pushed a small change for the recently released Volumiser tool. You can now read files directly al a NinjaCopy style from physical disk and volume handles. Handy for exfiltrating registry hives or ntds.dit on hosts with EDR's.

πŸ₯ [ tweet ]
😈 [ zux0x3a, Lawrence ε‹žε€«ζ–― | Ω„ΩˆΨ±Ψ§Ω†Ψ³ ]

https://t.co/nOAPMLpyhw

πŸ”— https://www.cyberwarfare.live/blog/vectored-syscall-poc

πŸ₯ [ tweet ]
😈 [ t3l3machus, Panagiotis Chartas ]

Using 𝐕𝐒π₯π₯𝐚𝐒𝐧, the evolution of π‡π¨πšπ±π’π‘πžπ₯π₯ to generate an auto-obfuscated PowerShell backdoor payload, bypass Defender and gain access to a Windows 11 Enterprise machine.

Download, install, connect with others & enjoy hacking as a team: https://t.co/PNuUQLhV6J

πŸ”— https://github.com/t3l3machus/Villain

πŸ₯ [ tweet ]
😈 [ cyb3rops, Florian Roth ⚑ ]

Imagine you'd get access to an unknown SIEM of a new customer & would be given 10min to find malicious activity by using keyword searches on raw data, what would you search for?

I'll start

'.dmp full'
'whoami'
'delete shadows'
'FromBase64String'
'save HKLM\SAM'
' -w hidden '

πŸ₯ [ tweet ]
πŸ€”1
😈 [ jack_halon, Jack Halon ]

Today I am releasing part 2 of my 3-part browser exploitation series on Chrome!

In part 2, we take a deep dive into the V8 compiler pipeline by understanding what happens under the hood in Ignition, Sparkplug, and TurboFan!

Enjoy!

https://t.co/XAnbzdnjeQ

πŸ”— https://jhalon.github.io/chrome-browser-exploitation-2/

πŸ₯ [ tweet ]
😈 [ aetsu, π•¬π–Šπ–™π–˜π–š ]

TripleCross: A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

https://t.co/jZ8KQnSUxs

πŸ”— https://github.com/h3xduck/TripleCross

πŸ₯ [ tweet ]
😈 [ testanull, Janggggg ]

You guys must be waiting for this,
So this is the working PoC script of the Exchange 0day exploited ITW

https://t.co/XGx0fYJygm

πŸ”— https://github.com/testanull/ProxyNotShell-PoC

πŸ₯ [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
НовыС ΡΡŽΡ€ΠΏΡ€ΠΈΠ·Ρ‹ Π² AD CS... Π”ΠΎΠ±Π°Π²ΠΈΠΌ Ρ‚Π΅Ρ…Π½ΠΈΠΊΡƒ ESC11πŸ™ˆ

https://blog.compass-security.com/2022/11/relaying-to-ad-certificate-services-over-rpc/

#ad #pentest #redteam
😈 [ Ben0xA, Ben Ten (0xA) ]

Releasing a new tool: Orpheus! Bypasses most Kerberoast Detections (including my own). Blog post and video is up at @TrustedSec! Even used @HackingDave's old alias in the demo. https://t.co/qhP8r28s4K #infosec #security #kerberoast

πŸ”— https://trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/

πŸ₯ [ tweet ]
😈 [ BushidoToken, Will | Darknet Diaries #126 ]

πŸ‘‰New Blog: I have attempted to track what happened to Conti this year after the leaks and collapse of the group. Here are my findings, largely based on #OSINT. Enjoy!

https://t.co/0jSd1ZFkLf #Conti #Quantum #BlackBasta #Royal #WizardSpider #CTI

πŸ”— https://blog.bushidotoken.net/2022/11/the-continuity-of-conti.html

πŸ₯ [ tweet ]
😈 [ splinter_code, Antonio Cocomazzi ]

A bad news for all potato lovers 😭

Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick to recover the INTERACTIVE sid group through the logon type New Credentials (9).

More details here πŸ‘‡

https://t.co/hfhZxk3zMg

cc @decoder_it

πŸ”— https://github.com/antonioCoco/JuicyPotatoNG/issues/4

πŸ₯ [ tweet ]
😒1