Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ 0xdf_, 0xdf ]

Acute from @hackthebox_eu was just a hard pure Windows box. I'll pivot between two hosts largely relying on credentials and enumeration to get domain admin.

https://t.co/p0Fhgak2dI

πŸ”— https://0xdf.gitlab.io/2022/07/16/htb-acute.html

πŸ₯ [ tweet ]
😈 [ ippsec, ippsec ]

#HackTheBox Acute video is now up! This was a tough Windows box with all the pivots between users. I decided to try out ConPtyShell to get a full PTY on Windows, had to do some light modifications to bypass Defender. https://t.co/hey5QSjGDr

πŸ”— https://youtu.be/jDYte7xNY1g

πŸ₯ [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

πŸ“New note is up on https://t.co/DIZF98zvlm

Threat emulation for Windows Installer (MSI) -> DLL malware. Learn how to make a malicious MSI like all the cool kids!

https://t.co/6vWFQckIWE

πŸ”— http://notes.huskyhacks.dev
πŸ”— https://notes.huskyhacks.dev/notes/ms-interloper-on-the-subject-of-malicious-msis

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

may be obsolete, because impacket has already included this in its examples, but added Kerberos auth support for writing msDS-AllowedToActOnBehalfOfOtherIdentity property. https://t.co/UGjU3Rt357

πŸ”— https://github.com/tothi/rbcd-attack

πŸ₯ [ tweet ]
😈 [ campuscodi, Catalin Cimpanu ]

Pretender, a cross-platform tool to obtain a machine-in-the-middle position inside Windows networks

Blog: https://t.co/RS2REMMeA1

GitHub: https://t.co/GCXEgBsOPF

πŸ”— https://blog.redteam-pentesting.de/2022/introducing-pretender/
πŸ”— https://github.com/RedTeamPentesting/pretender

πŸ₯ [ tweet ]
😈 [ LittleJoeTables, Moloch ]

For anyone that wants wants to follow along with the Sliver GUI development I've open sourced what I've completed so far. However, it's not a priority and no timeline on feature-complete: https://t.co/YcKmTL0nRi

PRs welcome :)

πŸ”— https://github.com/BishopFox/sliver-gui

πŸ₯ [ tweet ]
😈 [ tiraniddo, James Forshaw ]

I recommended to @_dirkjan to try my NtObjectManager PS module to do an AD access check, but of course I provided no guidance. Therefore, here's a quick blog post with an overview of the checking process and how to use the Get-AccessibleDsObject command. https://t.co/ZOoJe6DHAS

πŸ”— https://www.tiraniddo.dev/2022/07/access-checking-active-directory.html

πŸ₯ [ tweet ]
😈 [ 0gtweet, Grzegorz Tworek ]

Didn't described it precisely so far:
If you put 'mpnotify' value into the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, your exe will be launched by winlogon.exe when user logs on. After 30s the process will be terminated.
https://t.co/36luTJ3vqB

πŸ”— https://persistence-info.github.io/Data/mpnotify.html

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Malware Mutation Using Reinforcement Learning and Generative Adversarial Networks https://t.co/WxPdaOEkhj

πŸ”— https://github.com/CyberForce/Pesidious

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#Tooling βš”οΈ] Inspired by @s4ntiago_p and NanoDump I’ve fully switched to API Hashing for Windows API and syscalls resolution in DInjector. A quick re-hashing can be performed before compilation with a Python script.

πŸ₯ [ tweet ]
😈 [ Cx01N_, Cx01N ]

This is great!
https://t.co/xkvlT03Wf1

πŸ”— https://github.com/NARKOZ/hacker-scripts

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg (Shutdown) ]

After 4 months of testing/peer-review and the PR being in draft, dacledit is now ready for official review and merge in Impacket πŸ’ͺ This script can be used to read, write, remove, backup, restore ACEs in an object's DACL, see you soon when merged 😊

https://t.co/nQGZy1dnbR

πŸ”— https://github.com/SecureAuthCorp/impacket/pull/1291

πŸ₯ [ tweet ]
😈 [ lpha3ch0, Steve Campbell ]

My latest blog post, Pivoting for Pentesters https://t.co/9N1gxtdJXn #infosec #pentest #redteam

πŸ”— https://www.stevencampbell.info/Pivoting-for-pentesters/

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Shodan Dork in Manual mode - Part 1

Now that you all have Shodan membership it's time to try Shodan Dorks πŸ‘€πŸ‘‡

Credits: @securitytrails

#recon #Shodan #attacksurface #bugbountytips #BugBounty #cybersecurity

πŸ₯ [ tweet ]
😈 [ C5pider, 5pider ]

CoffeeLdr
A Beacon Object File Loader
https://t.co/vD2QlGhLov

πŸ”— https://github.com/Cracked5pider/CoffeeLdr

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

I just merged one of the most craziest module in CrackMapExec called "hash_spider" from @hackerm00n πŸš€

With an initial admin access, it will dump lsass recursively using BloodHound to find local admins path (adminTo) to harvest more users and find new paths until DA πŸ”₯

πŸͺ‚

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

elevated CVE-2022-30166 EoP to SYSTEM. the work was done by @tiraniddo, here I just modified their PoC for getting TGT dump, did some custom ticket conversion stuff then RBCD attack with the machine Kerberos TGT. works only if AllowTgtSessionKey (non-default) is enabled.

πŸ₯ [ tweet ][ quote ]