Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ _RastaMouse, Rasta Mouse ]

I spent some of time I was glued to my chair with sweat to put rportfwd into SharpC2 as well.

πŸ”— https://github.com/SharpC2/SharpC2/tree/dev

πŸ₯ [ tweet ]
😈 [ CoreAdvisories, CoreLabs Research ]

Get an in-depth analysis of recent #Windows #vulnerability, CVE-2022-22029> from cybersecurity expert and #exploit writer @ricnar456
https://t.co/i4nyYDiapH

πŸ”— https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-22029-windows-network-file-system-vulnerability

πŸ₯ [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

Confirmed that the new Apache Spark OS Command Injection works πŸŽ†

CVE-2022-33891 Apache Spark Shell Command Injection Vulnerability (disc. by Kostya Kortchinsky, not me)

Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1

POC soon!

πŸ₯ [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

🐍My Python POC for CVE-2022-33891, Apache Spark OS Command Injection Vulnerability

hacky, slapdash, just the way I like it

Can check if a target is vuln, do a quick reverse shell, and even has an "Interactive" mode!

comes with a vuln version of Spark

https://t.co/bOXMlXYmzd

πŸ”— https://github.com/HuskyHacks/cve-2022-33891

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

GOAD exploitation part5 : sAMAccountName spoofing and printNightmare.
https://t.co/F6X1HtUhCr

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part5/

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ mpgn_x64, mpgn ]

Let's bring some 'domain admin' music to CMEπŸ₯³

Soon, the blue team will hate this song ! πŸ˜‚πŸ”₯

πŸ₯ [ tweet ]
😈 [ kalilinux, Kali Linux ]

You know about our weekly images, but did you know we now have weekly VMs? Or, did you know you can use our build scripts to automate creating your own VMs?

Check it out!

https://t.co/WKekW7dncr

πŸ”— https://www.kali.org/blog/kali-vm-builder-weekly/

πŸ₯ [ tweet ]
😈 [ theluemmel, S4U2LuemmelSec ]

I am not shocked anymore :)
Confluence Questions hardcoded creds for user
CVE-2022-26138
https://t.co/2O3qt6IYee

πŸ”— https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26138

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ fluepke, @fluepke@chaos.social ]

Discovered by a fried of mine:

CVE-2022-26138: A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group

The password is disabled1system1user6708

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ cfalta, Christoph Falta ]

I wrote something to compare the content of two volume shadow copies. Let's hope that's useful πŸ˜… #dfir #PowerShell
https://t.co/ip15QPFaTq

πŸ”— https://github.com/cfalta/vsctool

πŸ₯ [ tweet ]
😈 [ filip_dragovic, Filip Dragovic ]

Just another way to abuse SeImpersonate privilege...
https://t.co/Q175DkLnyX

Hard work is done by crisprss (dont know twitter handle) , i simply found way to weaponize it. :)

πŸ”— https://github.com/Wh04m1001/DiagTrackEoP

πŸ₯ [ tweet ]
😈 [ MDSecLabs, MDSec ]

In part 1 of this blog series, @domchell provides an overview on detecting beacons https://t.co/hsTgTqQKs7

πŸ”— https://www.mdsec.co.uk/2022/07/part-1-how-i-met-your-beacon-overview/

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#HackTip βš’] When there’s not much info revealed about AD sites from CME subnets module, we can combine @_dirkjan’s adidnsdump with @pdiscoveryio mapcidr to get a nicely formatted list of the target intranetworks πŸ•Έ

#ad #dns

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ mpgn_x64, mpgn ]

Me after writing ONE vulnerablity out of 10 for the pentest report

πŸ₯ [ tweet ]

Π–ΠΈΠ·Π° ΠΆΠ΅ Π½Ρƒ
πŸ”₯3
😈 [ mpgn_x64, mpgn ]

Don't try me 😜

πŸ₯ [ tweet ][ quote ]
😈 [ 0xdf_, 0xdf ]

The best part of Catch from @hackthebox_eu is poisoning a config such that the server uses my VM for Redis, and serving a serialized PHP object to get RCE. There's several paths, and lots of interesting exploitation.

https://t.co/hRViK12SW6

πŸ”— https://0xdf.gitlab.io/2022/07/23/htb-catch.html

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Self-removing PE's with Remote Thread Injection
https://t.co/wSBqhFOl5b

πŸ”— http://0xthem.blogspot.com/2014/10/self-delete-pe.html

πŸ₯ [ tweet ]
😈 [ itm4n, Clément Labro ]

The July 2022 update of Windows 10/11 killed PPLdump πŸ’€πŸ˜’

Find out how in this blog post...
πŸ‘‰ https://t.co/o0izvkkSm0

πŸ”— https://itm4n.github.io/the-end-of-ppldump/

πŸ₯ [ tweet ]
😈 [ cube0x0, Cube0x0 ]

When you spend 2-months of your private time writing a full-featured C2 framework including C++ GUI, Backend, and a C++ PIC agent with custom functions only to end up clueless about what to do with it

πŸ₯ [ tweet ]