Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ 0xdf_, 0xdf ]

Timing from @hackthebox_eu had LFI, directory traversal, a side channel/timing attack, a mass assignment vulnerability, LFI+upload = RCE, and a custom downloader to exploit, all on the way to root.

https://t.co/QHYKm3OnLU

πŸ”— https://0xdf.gitlab.io/2022/06/04/htb-timing.html

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ c3rb3ru5d3d53c, ςΡяβΡяμs - мαℓωαяΡ яΡsΡαяςнΡя ]

#Suricata #Signature for Confluence CVE-2022-26134 #exploit #poc

ATTACK Potential URI Template Injection

https://t.co/8mVZhciNqF

πŸ”— https://github.com/c3rb3ru5d3d53c/signatures/blob/master/signatures/attack/injection/template/template.suricata-6.0.5.rules

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

storing creds for a runas-like utility in a saved config file is a security mistake, even if the tool offers "seriously obfuscated encrypted" files. all we need is just hooking CreateProcessWithLogonW (hello to @fridadotre) and no worries about reversing proprietary encryptions.

πŸ”— https://gist.github.com/tothi/dd3bdd5d9f88ffcd32be15b2ce480aa6

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Exploring data saved by Chrome/Edge/Any Chromium
https://t.co/5zAXvnmsa9 #dpapi

πŸ”— https://gist.github.com/jhoneill/e585bae781f3efa7ac1992b79e037713

πŸ₯ [ tweet ]
πŸ‘2
😈 [ NinjaParanoid, Paranoid Ninja (Brute Ratel C4) ]

Hunting alertable threads for QAPC on existing processes, rop-gadgets, Stagers and start address spoofing for the upcoming BRc4 v1.1 release...
https://t.co/5GH2Nwnp74

πŸ”— https://www.youtube.com/watch?v=w8ictUBcCrM

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

O365-Doppelganger. script to harvest credentials off of a user during a Red Team and get execution of a file from the user
https://t.co/0CpScve1sn

πŸ”— https://github.com/paranoidninja/O365-Doppelganger

πŸ₯ [ tweet ]
πŸ‘1
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Active Directory delegations inventory in Rust
https://t.co/qOoTA6X4yi

πŸ”— https://github.com/mtth-bfft/adeleg

πŸ₯ [ tweet ]
😈 [ Tarlogic, Tarlogic ]

Vulnerability CVE-2022-26134 has compromised Atlassian @Confluence servers and data centers and, along the way, the security of a multitude of companies. Our colleague @TuLkHaXs analyzes the scale of the incident and how to neutralize it πŸ‘‡
https://t.co/6k6ILkif0i

πŸ”— https://www.tarlogic.com/blog/cve-2022-26134-zero-day-vulnerability-affecting-atlassian-confluence/

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

GitHub Recon in Manual mode - Part 3 - Database
credits: techgaun/github-dorks

#recon #recontips #github #AttackSurface #bugbountytips #reconone #Database #gitrecon

πŸ₯ [ tweet ]
😈 [ ptswarm, PT SWARM ]

πŸ¦₯ Everyone learned to run pip install colorama to exploit Atlassian Confluence RCE (CVE-2022-26134), so let’s see how the vulnerability works under the hood.

Here we show our simplified payload which demonstrates a workflow inside the vulnerable code ‡️

πŸ₯ [ tweet ]
😈 [ _wald0, Andy Robbins ]

This week I'm publishing a 3 post series on #Azure Managed Identity attack paths. Here's part 1, where we are looking at Automation Accounts:

https://t.co/gZ6QjGw6CE

Prior work by @kfosaaen, @inversecos, https://t.co/Eb8grvTeOm, and @cibrax

πŸ”— https://posts.specterops.io/82667d17187a
πŸ”— http://azsec.azurewebsites.net

πŸ₯ [ tweet ]
😈 [ _JohnHammond, John Hammond is @ RSAC ]

Active Directory content will slowly trickle out on my YouTube channel over the next many days. We will build a local VM environment, stage out our domain at will with PowerShell, and bounce back and forth between "building" and "breaking" AD concepts
https://t.co/jHw7lS1St6

πŸ”— https://youtu.be/pKtDQtsubio

πŸ₯ [ tweet ]
😈 [ DebugPrivilege, β€’ ]

I can see that most people are familiar with AD and understand the enumeration piece of it through tools like PowerView, etc. However, how does this look from a code-level and network-level? My go-to tools are IDA and Wireshark to answer these types of questions.

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Want to scan for the TOP Exploited Vulnerabilities according to CISA? Try this πŸ‘‡
Credits: @pdiscoveryio

#nuclei #CISA #attacksurface #recon #reconone #bugbountytips #recontips

πŸ₯ [ tweet ]
😈 [ SagieSec, Sagie Dulce ]

#RPCFirewall version 2.0 is out!

Watch this tutorial that shows how to set it up, and start protecting against various RPC attacks : #petitpotam, #psexec, #dcsync, #wmic and more...

New features:
βœ”οΈ Support RPC Filters.
βœ”οΈ RPC Firewall as a service
βœ”οΈ Monitor & protect new processes
βœ”οΈ "Status" command for detailed deployment info
βœ”οΈ Better resolution of source host and port

πŸ”— https://youtu.be/BNzfmYwkioY
πŸ”— https://github.com/zeronetworks/rpcfirewall

πŸ₯ [ tweet ]