Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ Diego Capriotti @naksyn ]

Here's Process Stomping injection and how you can use it in a Mockingjay-ish way to load a Beacon on a exe's RWX section using sRDI. Check it out!

Blog:
πŸ”— https://www.naksyn.com/edr%20evasion/2023/11/18/mockingjay-revisited-process-stomping-srdi-beacon.html

Tool:
πŸ”— https://github.com/naksyn/ProcessStomping

Thanks to @hasherezade and @monoxgas for their awesome work

πŸ₯ [ tweet ]
πŸ”₯3
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Arris Huijgen @bitsadmin ]

#LOFLCAB highlight: Ssms.exe

Using SQL Server Management Studio with Kerberos authentication to obtain command execution on the SQL server using the xp_cmdshell stored procedure.

Details:
πŸ”— https://lofl-project.github.io/loflcab/Binaries/Ssms/

Full quality video:
πŸ”— https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3#sql-server

πŸ₯ [ tweet ][ quote ]
πŸ”₯3
😈 [ Adam Svoboda @adamsvoboda ]

Ever find yourself on an endpoint with SentinelOne and have Local Admin? Just ask SentinelAgent.exe nicely, and it will dump a process for you, including itself!

It bombs out on LSASS, but most other processes work.

πŸ”— https://gist.github.com/adamsvoboda/8e248c6b7fb812af5d04daba141c867e

Unable to dump LSASS using the previous script? No problem, just ask S1 for a Live Kernel Dump instead! You can open this in windbg (and use mimilib.dll) and go from there.

πŸ”— https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80

πŸ₯ [ tweet ][ quote ]
😁4
😈 [ HackerRalf @hacker_ralf ]

Everyone takes a lot from the community... it's time to give something back yourself.

Kerbeus - BOF implementation of Rubeus (not all).

πŸ”— https://github.com/RalfHacker/Kerbeus-BOF

P. S. PM me about all bugs

#redteam #kerberos #havoc #cobaltstrike #bof

πŸ₯ [ tweet ]
πŸ‘10
😈 [ hermit @ackmage ]

hi, check out this tool for easy Linux kernel building and debugging - easylkb

worked on it together with @netspooky! πŸ’•

writeup:
πŸ”— http://tmpout.sh/3/20.html

repo:
πŸ”— http://github.com/deepseagirl/easylkb

πŸ₯ [ tweet ]
πŸ‘4
😈 [ Synacktiv @Synacktiv ]

Unlock the Global Admin access πŸ† on Azure with this pentesting mindmap made by @alexisdanizan!

πŸ”— https://github.com/synacktiv/Mindmaps

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ OtterHacker @OtterHacker ]

Finally 🀩 I got a PIC code for my #beacon! It was a really nice journey and a lot of things have been learnt on the way. If you want to try it too, I found this blog by @winternl_t really interesting:

πŸ”— https://winternl.com/shellcodestdio/

And as usual, the @C5pider #Havoc ❀️

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ soka @pentest_soka ]

I just released a blogpost where I describe how two open source tools can be easily converted to Reflective DLL to be loaded in memory with Cobalt Strike.

This post comes along with which exists thanks to @Prepouce_ work

πŸ”— https://sokarepo.github.io/redteam/2023/10/11/create-reflective-dll-for-cobaltstrike.html
πŸ”— https://github.com/sokaRepo/CoercedPotatoRDLL

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ 𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ @felixm_pw ]

Indisputable C2 tier list

πŸ₯ [ tweet ]

ΠΊΡ€ΠΈΠ½ΠΆ ΠΈΠ»ΠΈ Ρ€ΠΎΡ„Π»?
😁15
😈 [ SAINTCON @SAINTCON ]

Lee Christensen, Will Schroeder, and Maxwell Harley - Fighting Data With Data

Detailing the various red team challenges regarding data, leading into how this influenced Nemesis’ architectural decisions and design.

πŸ”— https://youtu.be/0q9u2hDcpIo

πŸ₯ [ tweet ]
πŸ”₯1
Offensive Xwitter
😈 [ Antonio Cocomazzi @splinter_code ] Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe πŸ‘† πŸ₯ [ tweet ]
😈 [ an0n @an0n_r0 ]

just found that SharpHound used this RemoteRegistry trigger already earlier for session enumeration, like nmap smb-enum-sessions script and Sysinternals PsLoggedOn also. here is a nice summary about it from Sven Defatsch (@compasssecurity) in 2022:

πŸ”— https://blog.compass-security.com/2022/05/bloodhound-inner-workings-part-3/

πŸ₯ [ tweet ][ quote ]
πŸ‘1πŸ”₯1
ΠžΡ‡Π΅Π½ΡŒ ΠΊΡ€ΡƒΡ‚ΠΎ
Forwarded from vx-underground
Media is too big
VIEW IN TELEGRAM
Some nerd on Twitter named Bjorn Staal is programming out of his mind.

11/10. Solid programming skills (designed to demonstrate quantum entanglement)
🀯9πŸ‘1πŸ”₯1
vx-underground
Some nerd on Twitter named Bjorn Staal is programming out of his mind. 11/10. Solid programming skills (designed to demonstrate quantum entanglement)
😈 [ 𝕭𝖏ø𝖗𝖓 𝕾𝖙𝖆𝖆𝖑 @_nonfigurativ_ ]

Ok, so a lot of people have been asking me for code/writeup of this so I made a stripped down example (works with an infinite amount of windows) so that you can look at to get the basic gist of it (that's all I have time for now, sorry!).

πŸ”— https://bgstaal.github.io/multipleWindow3dScene/
πŸ”— https://github.com/bgstaal/multipleWindow3dScene

πŸ₯ [ tweet ][ quote ]
πŸ‘5
😈 [ Ido Veltzman @Idov31 ]

Weekly Nidhogg update
Driver hiding feature is also finished and live in the dev branch: :)
On the photos you can see the before and after in DriverView (From Nirsoft's tools)

πŸ”— https://github.com/Idov31/Nidhogg/tree/dev

#infosec #CyberSecurity

πŸ₯ [ tweet ]
πŸ‘4
😈 [ WHOAMI @wh0amitz ]

To audit the security of read-only domain controllers, I created the SharpRODC project, a simple .NET tool for RODC-related misconfigurations.

πŸ”— https://github.com/wh0amitz/SharpRODC

#infosec #redteam #cybersecurity #pentesting

πŸ₯ [ tweet ]
πŸ”₯3