Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ theluemmel, S4U2LuemmelSec ]

Just pushed a little update to the relay / MitM blog again.
This time NTLM Downgrade attacks.
https://t.co/R7PRhcQ37F

If successfull, you can afterwards nicely do pass the hash attacks with you new NT hash :)

๐Ÿ”— http://luemmelsec.github.io/Relaying-101/#ntlm-downgrade-attack

๐Ÿฅ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ podalirius_, Podalirius ]

Ever wanted to trigger a #NTLM authentication to a machine using every possible RPC call ? You can do this using #Coercer ๐Ÿฅณ๐ŸŽ‰

This tool automatically detects available pipes and protocols and call every possible functions to trigger an #authentication.

https://t.co/6aVELSP4NC

๐Ÿ”— https://github.com/p0dalirius/Coercer

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ‘น [ snovvcrash, sn๐Ÿฅถvvcr๐Ÿ’ฅsh ]

๐Ÿงถ (1/3) PCredz in Docker Thread

Iโ€™m a big fan of the #Impacket multi-relay feature that not only allows an attacker to keep multiple relay targets alive, but can also be used for performing both #NTLM relay AND #hashes dump at the same time โฌ

https://t.co/EZtH02ynTN

#pentest

๐Ÿ”— https://www.secureauth.com/blog/we-love-relaying-credentials-a-technical-guide-to-relaying-credentials-everywhere/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
๐Ÿ˜ˆ [ Steph @w34kp455 ]

Call it the biggest #NTLM #password database or monstrous #MD5 leak, but on, you can find precomputed datasets for various wordlists and different hashes - all free!
FYI: all_in_one.latin.txt for NTLM contains 26.5 billion pairs of hash:password inside!๐Ÿ”ฅ

๐Ÿ”— http://weakpass.com

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ19๐Ÿ‘5