Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]

S4uDelegator. tool to perform S4U logon with SeTcbPrivilege, by @@daem0nc0re
https://t.co/7qFTFtX6Um

πŸ”— https://github.com/daem0nc0re/PrivFu#s4udelegator

πŸ₯ [ tweet ]
πŸ‘1
😈 [ m3g9tr0n, Spiros Fraganastasis ]

How the Active Directory Replication Model Works
https://t.co/oQKPMswqK5

πŸ”— https://premglitz.wordpress.com/2013/03/20/how-the-active-directory-replication-model-works/

πŸ₯ [ tweet ]
πŸ”₯2πŸ‘1
😈 [ citronneur, Sylvain Peyrefitte ]

Time Travel Debugging for #IDA https://t.co/9QRB0UBuAy

πŸ”— https://github.com/airbus-cert/ttddbg

πŸ₯ [ tweet ]
πŸ‘1
Forwarded from Offensive Xwitter Eye
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

Two-week security assessment is over, finally… Way too many lessons learned, oh well. Here’s the final step of taking down the critical OpenShift cluster with a single curl (hard-coded tokens is always a bad idea). So current mood is like the Burning Chrome last paragraphs 🫑

πŸ₯ [ tweet ]
😈 [ DebugPrivilege, β€’ ]

I came across a video of a talk from @MSwannMSFT on Intrusion Detection with Graphs https://t.co/4hKezgfM6N - interesting talk for blue teamers!

πŸ”— https://youtu.be/tGWSnuyZ4GQ

πŸ₯ [ tweet ]
⚠️ DISCLAIMER ⚠️

‼️ All information posted in this channel (https://xn--r1a.website/OffensiveTwitter) is intended for research and/or educational purposes only.

‼️ The owner of this channel is NOT responsible for any illegal use of the information this channel is providing or referring to.

‼️ The owner of this channel does NOT promote any illegal activity related to unethical hacking, cybercrimes, malware distribution, etc.

‼️ Remember that computer crimes are ALWAYS punishable by the law, so please do watch what you are doing.

#disclaimer
😁8
😈 [ HackingLZ, Justin ]

Actual details on the Confluence CVE-2022-26134

https://t.co/qU3BfAQEa9

πŸ”— https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ vxunderground, vx-underground ]

We've updated the vx-underground Malware Analysis collection. We have added 13 new papers courtesy of @malpedia.

Check it out here: https://t.co/djuVYEkbLT

Have a nice day.

πŸ”— https://www.vx-underground.org/malware_defense.html#malware_analysis

πŸ₯ [ tweet ]
😈 [ HackingLZ, Justin ]

Since everyone is mentioning AzureAD to protect assets instead of putting them directly on the internet...Keep this in mind for future egress detections. https://t.co/mvgebEssdW

πŸ”— https://www.trustedsec.com/blog/azure-application-proxy-c2/

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

SharpRDPHijack, by @bohops
https://t.co/LNA6bv9TIq

πŸ”— https://github.com/bohops/SharpRDPHijack

πŸ₯ [ tweet ]
😈 [ FSDominguez, Francisco Dominguez ]

Not only inject&forget, but you can use quantum insert/spoofed packets for bidirectional communication as well to bypass very strict firewalls.

https://t.co/D4dzlAfHrM

πŸ”— https://diablohorn.com/2017/05/21/quantum-insert-bypassing-ip-restrictions/

πŸ₯ [ tweet ][ quote ]
πŸ‘1
😈 [ am0nsec, Paul L. ]

I published my little experiment with the Windows Memory Manager in order to get Virtual Address Descriptors (VADs) from an arbitrary process. This is a proof of concept - use caution. Will use this repository to add more stuff over time.

https://t.co/hFqH4duKLX

πŸ”— https://github.com/am0nsec/wkpe

πŸ₯ [ tweet ]
😈 [ _wald0, Andy Robbins ]

Today is Friday, which means it's #BloodHoundBasics day.

Here is the recording of my @BlackHatEvents Asia presentation covering the origins of BloodHound. In particular: what problem BloodHound set out to solve in the first place: https://t.co/px9EZysXc7

πŸ”— https://www.youtube.com/watch?v=Yl7gwdTFK18

πŸ₯ [ tweet ]
😈 [ HackingLZ, Justin ]

So they updated the advisory with a patch/replacement for a single file which is great...However I would suspect it won't take a lot of work to diff old vs new? Incoming PoC?

https://t.co/4lbxkVc1Ja

πŸ”— https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html

πŸ₯ [ tweet ]