Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ 424f424f, rvrsh3ll ]

Ok fellow phishers. @Microsoft keeps harassing me via email to correct my blog post. How many of you have had success spoofing with this technique this last year? Time for them to fix this?
https://t.co/TTiUEbZhpI

πŸ”— https://www.blackhillsinfosec.com/spoofing-microsoft-365-like-its-1995/

πŸ₯ [ tweet ]
😈 [ 404death, sailay(valen) ]

I just created the tool which can help to get NT AUTHORITY\SYSTEM from arbitrary directory creation bugs.
https://t.co/Mcv4HH2olT

πŸ”— https://github.com/binderlabs/DirCreate2System

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg β€œShutdown” ]

Updated the DACL abuse mindmap. New dark theme, used BloodHound's iconography, added the ACE inheritance path for Containers and Organizational Unit.

πŸ§‘β€πŸ³ The Hacker Recipes https://t.co/iMrOGWv63j

πŸ”— https://www.thehacker.recipes/ad/movement/dacl

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ OutflankNL, Outflank ]

New BOF released to our OST customers: Coercer

Coercer triggers a novel and non-public coercion method that forces SMB authentication from the computer account on workstations. From there on, you can for example relay to ADCS for generating a computer certificate.

πŸ₯ [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post on alternate ways to impersonate access tokens in C#, including in other threads. Thanks @GuhnooPlusLinux for providing the inspiration.

https://t.co/TRdI5zuR5j

πŸ”— https://rastamouse.me/token-impersonation-in-csharp/

πŸ₯ [ tweet ]
😈 [ 0xdf_, 0xdf ]

Support is the 4th box I've released on @hackthebox_eu! It retires today. Light .NET reverseing, LDAP enumeration, and genericall on the DC -> a fake machine AD attack.

Inspiration for the box comes from a @7minsec "tales of pentest pwnage" episode.

https://t.co/79G4EUS7Nt

πŸ”— https://0xdf.gitlab.io/2022/12/17/htb-support.html

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Idov31, Ido Veltzman ]

I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.

https://t.co/AVxQbNru3Z

#infosec #CyberSecurity

πŸ”— https://github.com/Idov31/Venom

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

1. remove disk from target laptop
2. virtualize system (VBoxManage convertfromraw)
3. abuse local admin (chntpw using alt booted system)
4. run mimikatz by reflective loading (bypass ESET :) )
5. extract machine cert / secrets

NEVER deploy company laptop without BitLocker.

πŸ₯ [ tweet ]
😁5πŸ”₯2πŸ₯±1
😈 [ namazso, namazso ]

After being asked for it a few times in DMs, I decided to just publish my ptrace-less injector for x64 Linux

https://t.co/zqsP0xiJdZ

(via @namazso@mastodon.cloud)

πŸ”— https://github.com/namazso/linux_injector

πŸ₯ [ tweet ]
Ля, ΠΏΠΎΡ‡Π΅ΠΌΡƒ это Ρ‚Π°ΠΊ ΠΎΡ€Π½ΠΎ
😁4
😈 [ _nwodtuhs, Charlie Bromberg β€œShutdown” ]

πŸŽ… xmas contribution to one of the tools I used most in 2022. #BloodHound

https://t.co/KqJYEOfzOs

πŸ”— https://github.com/BloodHoundAD/BloodHound/pull/625

πŸ₯ [ tweet ]
😈 [ IKalendarov, Ilan Kalendarov ]

New research of mine about using hardware breakpoint for EDR evasion. Thanks to @rad9800 for the inspiration on this topic.

https://t.co/Ax2IZkSOI2

πŸ”— https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints?utm_campaign=Oktopost-Research&utm_content=Oktopost-Twitter&utm_medium=Twitter&utm_source=Organic_Social

πŸ₯ [ tweet ]
😈 [ mariuszbit, mgeeky | Mariusz Banach ]

☒️ Recently we started seeing Threat Actors abusing MSI Windows Installation files for Initial Access & code execution

πŸ”₯ I now release Part 1 insights into how MSIs can be abused, PoCs for πŸ”΄ & dissection utility for πŸ”΅

🦠 Let me know what you think!

https://t.co/X7vi6BGQg5

πŸ”— https://mgeeky.tech/msi-shenanigans-part-1/
πŸ”— https://github.com/mgeeky/msi-shenanigans
πŸ”— https://github.com/mgeeky/msidump

πŸ₯ [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

I've been trying to get NtCreateUserProcess working in C#, but no joy yet. If anyone wants to take a stab at fixing the code, it's here:

https://t.co/ma3iuCSFjj

πŸ”— https://gist.github.com/rasta-mouse/2f6316083dd2f38bb91f160cca2088df

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

Finally, the last part of GOAD writeups is done ! πŸ₯³
Part 12 : Trusts

https://t.co/q6XDr8GTUD

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part12/

πŸ₯ [ tweet ]
Писал Ρ‚ΡƒΡ‚ Π½Π° ΠΊΠΎΠ»Π΅Π½ΠΊΠ΅ скрипт для энума ΡΡƒΡ‰Π΅ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΡ… Π΅ΠΌΠ΅ΠΉΠ»ΠΎΠ² Π½Π° Mail.ru Ρ‡Π΅Ρ€Π΅Π· Tor. ВСкстом Π½Π΅ ΠΎΡ‚Π΄Π°ΠΌ, придСтся ΠΏΠ΅Ρ€Π΅ΠΏΠΈΡΡ‹Π²Π°Ρ‚ΡŒ πŸ˜†
πŸ”₯6
😈 [ sprocket_ed, ed ]

Not bad - https://t.co/RdbIsLfGRy

πŸ”— https://github.com/m1guelpf/plz-cli

πŸ₯ [ tweet ]
πŸ”₯4