Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ splinter_code, Antonio Cocomazzi ]

A bad news for all potato lovers 😭

Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick to recover the INTERACTIVE sid group through the logon type New Credentials (9).

More details here πŸ‘‡

https://t.co/hfhZxk3zMg

cc @decoder_it

πŸ”— https://github.com/antonioCoco/JuicyPotatoNG/issues/4

πŸ₯ [ tweet ]
😒1
Π―, ΠΊΠΎΠ½Π΅Ρ‡Π½ΠΎ, Π½Π΅ Ρ…Π²Π°ΡΡ‚Π°ΡŽΡΡŒ, но… 😳😱
πŸ”₯17😁8πŸ€”1
😈 [ 0xdf_, 0xdf ]

Hathor from @hackthebox_eu was a monster Windows box. My favorite parts were being forced to understand the AppLocker rules, and finding the code signing cert in the recycle bin and using it to bypass applocker. Lots of tricky steps on this one.

https://t.co/thTyAtHW9p

πŸ”— https://0xdf.gitlab.io/2022/11/19/htb-hathor.html

πŸ₯ [ tweet ]
😈 [ 0xBoku, Bobby Cooke ]

Checkout SQLRecon by @sanjivkawa! C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
https://t.co/qSWDXimeJS
The tool has a great wiki on how to use it and you can find conference talks & slide decks on the tool here: https://t.co/W5EKXDIrJI

πŸ”— https://github.com/xforcered/SQLRecon
πŸ”— https://github.com/skahwah/Conference-Talks/tree/main/2022-Way-West-Hackin-Fest

πŸ₯ [ tweet ]
😈 [ _xpn_, Adam Chester ]

Having a bit of fun on Mastodon this weekend creating S-Rank Influencer accounts by mocking out ActivityPub πŸ˜‚πŸ˜‚ https://t.co/OP5PXwrLFW

πŸ”— https://infosec.exchange/@xpn/109371536418521307

πŸ₯ [ tweet ]
😈 [ ali_alwashali, Ali Alwashali-ng ]

Windows hardening script
https://t.co/b7QWvXL5iB

Leverages windows firewall to block certain binaries from making connections
Sets lsass in protected mode
Implementation of ASR rules
Harden office
Disables DNS multicast, smbv1, netbios, powershellv2
Change file associations

πŸ”— https://gist.github.com/mackwage/08604751462126599d7e52f233490efe

πŸ₯ [ tweet ]
😈 [ T00uF, TouF ]

Just pushed a HUGE refacto in #DonPapi to make it work with Kerberos TGT.
seems your clients are as my clients and don't use protected users enough πŸ˜…
or maybe you were using the --laps options to automatically retrieve local admin credz ? πŸ€”

https://t.co/XiCB7MDVEs

πŸ”— https://github.com/login-securite/DonPAPI

πŸ₯ [ tweet ]
😈 [ _Kudaes_, Kurosh Dabbagh ]

Unwinder, another approach to Thread Stack Spoofing by walking PE's unwind information. This technique allows to automatically create "any" desired call stack by parsing .pdata structures.
It took me a little bit longer than expected, but worth the effort!
https://t.co/9gUEanOHeC

πŸ”— https://github.com/Kudaes/Unwinder

πŸ₯ [ tweet ]
😈 [ theluemmel, ADCluemmelSec ]

Always good to have some NotCovenant running on a fully fledged Defender EDR system ^^

Thx @assume_breach for his cool writeups lately:
https://t.co/jAyRonr2sF

πŸ”— https://assume-breach.medium.com/

πŸ₯ [ tweet ]
😈 [ _dirkjan, Dirk-jan ]

The video recording of my Black Hat talk this summer "Backdooring and Hijacking Azure AD Accounts by Abusing External Identities" made it to YouTube: https://t.co/yOwxDB8reo

πŸ”— https://www.youtube.com/watch?v=uKDS2t9_KsA

πŸ₯ [ tweet ]
😈 [ gladiatx0r, Maximus ]

Just a reminder that if LDAP(S) signing/binding is not enforced then you can still LPE on any Windows workstation. Awesome video demo by @vendetce shows you how. Alternatively start Webclient programmatically https://t.co/TCanM8C6Ai or switch out P.P. for https://t.co/3i83NdpQzc

πŸ”— https://gist.github.com/klezVirus/af004842a73779e1d03d47e041115797
πŸ”— https://github.com/nccgroup/Change-Lockscreen

πŸ₯ [ tweet ][ quote ]
😈 [ Synacktiv, Synacktiv ]

Our ninjas @yaumn_ and @mickaelweb recently assessed Microsoft Defender for Identity detection capabilities. In their recent blogpost, they describe the product's architecture, present some bypasses and give general Red Team advices. https://t.co/tuBoWYEVQ9

πŸ”— https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html

πŸ₯ [ tweet ]
😈 [ _EthicalChaos_, Ceri 🏴󠁧󠁒󠁷󠁬󠁳󠁿 ]

@_RastaMouse Python via choco is great, all fluid and just works. A Hyper-V VM with Windows 11 on + choco is awesome attacking machine. I have WSL on there as backup but rarely use, even for relaying

πŸ₯ [ tweet ]

Ρ…ΠΎΡ€ΠΎΡˆΠΈΠΉ совСт для виндосСтапа ΠΎΡ‚ этикал хаоса
πŸ”₯2
😈 [ i_bo0om, Bo0oM ]

Defending against automatization using nginx

https://t.co/MTsVPFxDsJ

πŸ”— https://speakerdeck.com/bo0om/defending-against-automatization-using-nginx

πŸ₯ [ tweet ]
🀯1
😈 [ OutflankNL, Outflank ]

KerberosAsk is the latest addition to our OST offering. It is a fully inline BOF implementation of some of the core Kerberos commands from Rubeus/Kekeo.

Ask a TGT, a service ticket or exploit CVE-2022-33679. Also works with certs to support your ADCS magic.
Demo below. ⬇️ (1/3)

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

ntfsDump: just found this from @3gstudent (and used successfully for reading ntds.dit on a DC):

https://t.co/hFGhEg2eYH

similar to the powershell version Invoke-Ninjacopy, but this time it is a c++ binary. sometimes it is better to have a binary than a PS (for opsec reasons).

πŸ”— https://github.com/3gstudent/ntfsDump

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

minikerberos got a public update v0.3.5(pip+github):
Supports RC4_MD4 auth
CVE2022-33647 added
CVE2022-33679 added
RC4-TGS-REP ticket decryptor with NT hashes added (read: no need to know password)
Thx for @porchetta_ind supporters!
https://t.co/VdSkb0DEkv

πŸ”— https://github.com/skelsec/minikerberos/

πŸ₯ [ tweet ]
😈 [ EmpireC2Project, Empire ]

Interested in all the features that #EmpireC2Project has to offer? Check out our docs to stay up-to-date!
https://t.co/rR7JV1C55s

πŸ”— http://empirec2project.com

πŸ₯ [ tweet ]
😈 [ t3l3machus, Panagiotis Chartas ]

New & simple tool for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesystem to a victim machine during privilege escalation.

Also supports PUT requests so you can transfer files from victim to attacker box.

πŸ”— https://github.com/t3l3machus/wwwtree

πŸ₯ [ tweet ]
πŸ”₯3