Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ _zblurx, Thomas Seigneuret ]

Want to bypass Windows Defender when dumping LSASS ? Just dump into .log files๐Ÿ˜…

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ4๐Ÿ˜2๐Ÿ‘1๐Ÿ˜ข1
๐Ÿ˜ˆ [ kleiton0x7e, Kleiton Kurti ]

Came up with an improved version of WMIExec. By leveraging the Win32_ScheduledJob class, we can remotely create scheduled jobs. This way it's not required anymore to rely on port 139 and 445.

Github:

#CyberSecurity #redteam #infosec #infosecurity

๐Ÿ”— https://github.com/WKL-Sec/wmiexec/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
๐Ÿ˜ˆ [ passthehashbrwn, Josh ]

Just published a new blog post covering how to hide Beacon during BOF execution. If your BOF triggers a memory scan then EDR is likely to find Beacon and kill your process, but we can mask it using a simple technique.

๐Ÿ”— https://securityintelligence.com/posts/how-to-hide-beacon-during-bof-execution/
๐Ÿ”— https://github.com/xforcered/bofmask

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ an0n_r0, an0n ]

Just recreated this awesome @SpecterOps (@zyn3rgy, @0xthirteen) technique for initial access by #backdooring a random #ClickOnce application with a Cobalt Strike stager. While I became a ClickOnce addict๐Ÿ™ƒ, compiled a short writeup about my journey:

๐Ÿ”— https://an0n-r0.medium.com/backdooring-clickonce-net-for-initial-access-a-practical-example-1eb6863c0579

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ‘7
Forwarded from ะ’ะพะปะพัะฐั‚ั‹ะน ะฑัƒะฑะปะธะบ
4 ะฝะพะฒั‹ั… ะฒะธะดะตะพ ะฝะฐ ะบะฐะฝะฐะปะต SpecterOps

Security Distilled: Building a First-Principles Approach to Security
https://www.youtube.com/watch?v=zjJaYwqVHxY

A Taste of Kerberos Abuse
https://www.youtube.com/watch?v=9SUXifUp9ZY

The BloodHound 4.3 Release: Get Global Admin More Often
https://www.youtube.com/watch?v=H1q-CBHbmHE

Red + Blue, How Purple Are You? Identifying Gaps in The Spectrum of Security
https://www.youtube.com/watch?v=B_2AfoT2WxU
๐Ÿ‘3๐Ÿ”ฅ1
๐Ÿ˜ˆ [ ricnar456, Ricardo Narvaja ]

As promised, the research on CVE-2023-28252 is already published with its PoC and the detailed explanation of the reversing that we did with my friend @solidclt.

๐Ÿ”— https://www.coresecurity.com/core-labs/articles/understanding-cve-2022-37969-windows-clfs-lpe
๐Ÿ”— https://github.com/fortra/CVE-2023-28252

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ6
This media is not supported in your browser
VIEW IN TELEGRAM
ะ”ะพะปะธัั‚ะฐะป ั‚ะฒะธั‚ั‚ะตั€ ะดะพ ั€ะตะนั‚ ะปะธะผะธั‚ะฐ, ะฟะพัั‚ะพะผัƒ ะฒะผะตัั‚ะพ ะฟะพัั‚ะพะฒ ะฟั€ะพ ะฟะตะฝะตั‚ั€ะตัั‚ั‹ ะฒะพั‚
๐Ÿ˜ข8๐Ÿ‘3๐Ÿ”ฅ2
๐Ÿ˜ˆ [ VirtualAllocEx, Daniel Feichter ]

Although the Hell's Gate POC is a few years old, I was interested in understanding it in more detail.
So I wrote the new blog post "Exploring Hell's Gate" - an in-depth look at Hell's Gate.

๐Ÿ”— https://redops.at/en/blog/exploring-hells-gate

๐Ÿฅ [ tweet ]
๐Ÿ‘1
๐Ÿ˜ˆ [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post showing how C# Source Generators could be used to build customisable implants.

๐Ÿ”— https://rastamouse.me/csharp-source-generators/

๐Ÿฅ [ tweet ]
๐Ÿ‘1
๐Ÿ˜ˆ [ D1rkMtr, D1rkMtr ]

A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe)

๐Ÿ”— https://github.com/TheD1rkMtr/TakeMyRDP

๐Ÿฅ [ tweet ]
๐Ÿ‘4
๐Ÿ˜ˆ [ HackAndDo, Pixis ]

Here we go, new articles are ready on a brand new and exciting topic, smart contracts security! โ›“๏ธ

โฉTo get things off to a good start, here's the first article, Blockchain 101.
Happy reading!

๐Ÿ”— https://en.hackndo.com/blockchain/

๐Ÿฅ [ tweet ]

ะฝะต ัะธะปัŒะฝะพ ัƒะฒะปะตะบะฐัŽััŒ ะฑะปะพะบั‡ะตะนะฝะฐะผะธ, ะฝะพ ะฟะพั‡ะธั‚ะฐั‚ัŒ ะผะพะถะฝะพ ั€ะฐะท ะพั‚ ัƒะฒะžะถะฐะตะผะพะณะพ ะฐะฒั‚ะพั€ะฐ
๐Ÿ”ฅ4๐Ÿ‘2
๐Ÿ˜ˆ [ sensepost, Orange Cyberdefense's SensePost Team ]

Read how you can JOIN @steampipeio on @pdiscoveryio to get structured output in your reconnaissance / footprinting / bugbounty data in this experimental steampipe plugin by @leonjza!

Code here:

๐Ÿ”— https://sensepost.com/blog/2023/select-from-projectdiscovery-join-steampipe/
๐Ÿ”— https://github.com/sensepost/steampipe-plugin-projectdiscovery

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2๐Ÿ‘1
๐Ÿ˜ˆ [ Octoberfest73, Octoberfest7 ]

Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.

This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.

#redteam #Malware

๐Ÿ”— https://github.com/Octoberfest7/TeamsPhisher

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ3๐Ÿ˜1
๐Ÿ˜ˆ [ SEKTOR7net, SEKTOR7 Institute ]

A guide to building your engagement infrastructure, by Andrรฉ Tschapeller (@hipstertrojan)

#redteam

๐Ÿ”— https://www.securesystems.de/blog/building-a-red-team-infrastructure-in-2023/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ rayanlecat, Rayan Bouyaiche ]

Hello everyone ! This weekend I participated to @_leHACK_ where i could do the CrackMapExec workshop of @mpgn_x64 . I did a little writeup if you're interested

๐Ÿ”— https://rayanlecat.ghost.io/write-up-workshop-cme-lehack-2023/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ6
๐Ÿ˜ˆ [ eversinc33, eversinc33 ]

I was tired of manually creating wordlists or having to rely on python for pre2k sprays, so did some small adjustments to @dafthack's DomainPasswordSpray to run pre2k password spraying on all computer objects of a domain.

๐Ÿ”— https://github.com/eversinc33/Invoke-Pre2kSpray

๐Ÿฅ [ tweet ]
๐Ÿ‘3
๐Ÿ˜ˆ [ EricaZelic, typedef struct _MALCOM { ]

Finally has some time to put the LDAP queries tweet in a blog post. Added some brief descriptions, how to enumerate nested group membership and members of Protected Users group.

๐Ÿ”— https://www.politoinc.com/post/ldap-queries-for-offensive-and-defensive-operations

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ cnotin, Clรฉment Notin ]

๐Ÿ“„ "How to read Windows serialized certificates"

Sharing a code sample to read binary files in "%APPDATA%\Microsoft\SystemCertificates\My\Certificates", which are serialized certificates, using CryptQueryObject() (and more!)

๐Ÿ”— https://medium.com/tenable-techblog/code-for-reading-windows-serialized-certificates-8634d3487ec7

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ 0x6d69636b, Michael Schneider ]

My colleague @m8r1us has written an article about hardware keyloggers:

๐Ÿ”— https://www.scip.ch/en/?labs.20230706

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ vxunderground, vx-underground ]

The classic Russian "Hacker" magazine had some of the coolest artwork in the 90s

๐Ÿฅ [ tweet ]

true
๐Ÿ”ฅ10๐Ÿ‘1