Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
Forwarded from Offensive Xwitter Eye
😈 [ exploitph, Charlie Clark ]

My latest research which completely breaks trust transitivity, enjoy :-)

https://t.co/1xUlMXrJbF

🔗 https://exploit.ph/external-trusts-are-evil.html

🐥 [ tweet ]
😈 [ TrustedSec, TrustedSec ]

In our newest #blog post, TAC Practice Lead @4ndr3w6S and co-author @exploitph lead us through the examination of #Kerberos ticket times and #checksums to demonstrate their importance and how they can better serve both offensive and defensive operators. https://t.co/kGgsXB0VUO

🔗 https://hubs.la/Q01GMZBS0

🐥 [ tweet ]
😈 [ MDSecLabs, MDSec ]

We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: https://t.co/xDxGwJfY2e by @domchell

🔗 https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Have been playing around with Domain Fronting via Fastly and discovered that you actually do not need to confirm the domain name ownership (by adding a CNAME) for the traffic to flow towards your IP. A bug or feature? 🤔

🐥 [ tweet ]

игрались тут с @Acrono с домен фронтингом и вот такую фичу интересную нашли
🔥4😁2
~$ git clone https://github.com/worawit/MS17-010.git && cd MS17-010

~$ git checkout -b smb_get_file 83b3745

~$ wget https://gist.github.com/snovvcrash/e910523a366844448e3a2b40685969e7/raw/e00b7b04aa5c96b0e5f21eae305448cf3c2fd4fa/zzz_smb_get_file.patch

~$ git apply zzz_smb_get_file.patch
🔥6
Forwarded from Great
Привет, а можешь на гист залить zzz_exploit ?
https://twitter.com/snovvcrash/status/1636406137510666242
🤔3
😈 [ ZeroMemoryEx, V2 ]

a kernel mode driver that can replace a process token with the system token for elevating Process privileges, check it out .
https://t.co/XFbHcTc1JX

🔗 https://github.com/ZeroMemoryEx/Tokenizer

🐥 [ tweet ]
⚠️ Тут это, говорят, сервера ложатся от дцсинка сикретсдампом (2012R2, 2016, 2019). Когда есть возможность, не реплицируйте вслепую весь нтдс – лсасс не выдерживает.

https://github.com/fortra/impacket/issues/1436#issuecomment-1476996085
😈 [ passthehashbrwn, Josh ]

Here's a short blog on using Frida to write and bypass detections for your TTPs. We can use good ol' userland hooking + JavaScript bindings to avoid writing complex kernel code, which lets us quickly develop test cases and improve our techniques.

https://t.co/IxixfRmG67

🔗 https://passthehashbrowns.github.io/using-frida-for-rapid-detection-testing

🐥 [ tweet ]
😈 [ _0pr_, ChaofanXU ]

Read @0xTriboulet 's blog https://t.co/FTGXcJD4e3 is like an addiction. Teaches you how to become a good "shellcode smuggler". And, Sektor7 is a must go too.

🔗 https://steve-s.gitbook.io/0xtriboulet/

🐥 [ tweet ]
🔥1