Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ M4yFly, Mayfly ]

GOAD exploitation part5 : sAMAccountName spoofing and printNightmare.
https://t.co/F6X1HtUhCr

πŸ”— https://mayfly277.github.io/posts/GOADv2-pwning-part5/

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ mpgn_x64, mpgn ]

Let's bring some 'domain admin' music to CMEπŸ₯³

Soon, the blue team will hate this song ! πŸ˜‚πŸ”₯

πŸ₯ [ tweet ]
😈 [ kalilinux, Kali Linux ]

You know about our weekly images, but did you know we now have weekly VMs? Or, did you know you can use our build scripts to automate creating your own VMs?

Check it out!

https://t.co/WKekW7dncr

πŸ”— https://www.kali.org/blog/kali-vm-builder-weekly/

πŸ₯ [ tweet ]
😈 [ theluemmel, S4U2LuemmelSec ]

I am not shocked anymore :)
Confluence Questions hardcoded creds for user
CVE-2022-26138
https://t.co/2O3qt6IYee

πŸ”— https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26138

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ fluepke, @fluepke@chaos.social ]

Discovered by a fried of mine:

CVE-2022-26138: A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group

The password is disabled1system1user6708

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ cfalta, Christoph Falta ]

I wrote something to compare the content of two volume shadow copies. Let's hope that's useful πŸ˜… #dfir #PowerShell
https://t.co/ip15QPFaTq

πŸ”— https://github.com/cfalta/vsctool

πŸ₯ [ tweet ]
😈 [ filip_dragovic, Filip Dragovic ]

Just another way to abuse SeImpersonate privilege...
https://t.co/Q175DkLnyX

Hard work is done by crisprss (dont know twitter handle) , i simply found way to weaponize it. :)

πŸ”— https://github.com/Wh04m1001/DiagTrackEoP

πŸ₯ [ tweet ]
😈 [ MDSecLabs, MDSec ]

In part 1 of this blog series, @domchell provides an overview on detecting beacons https://t.co/hsTgTqQKs7

πŸ”— https://www.mdsec.co.uk/2022/07/part-1-how-i-met-your-beacon-overview/

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#HackTip βš’] When there’s not much info revealed about AD sites from CME subnets module, we can combine @_dirkjan’s adidnsdump with @pdiscoveryio mapcidr to get a nicely formatted list of the target intranetworks πŸ•Έ

#ad #dns

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ mpgn_x64, mpgn ]

Me after writing ONE vulnerablity out of 10 for the pentest report

πŸ₯ [ tweet ]

Π–ΠΈΠ·Π° ΠΆΠ΅ Π½Ρƒ
πŸ”₯3
😈 [ mpgn_x64, mpgn ]

Don't try me 😜

πŸ₯ [ tweet ][ quote ]
😈 [ 0xdf_, 0xdf ]

The best part of Catch from @hackthebox_eu is poisoning a config such that the server uses my VM for Redis, and serving a serialized PHP object to get RCE. There's several paths, and lots of interesting exploitation.

https://t.co/hRViK12SW6

πŸ”— https://0xdf.gitlab.io/2022/07/23/htb-catch.html

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Self-removing PE's with Remote Thread Injection
https://t.co/wSBqhFOl5b

πŸ”— http://0xthem.blogspot.com/2014/10/self-delete-pe.html

πŸ₯ [ tweet ]
😈 [ itm4n, Clément Labro ]

The July 2022 update of Windows 10/11 killed PPLdump πŸ’€πŸ˜’

Find out how in this blog post...
πŸ‘‰ https://t.co/o0izvkkSm0

πŸ”— https://itm4n.github.io/the-end-of-ppldump/

πŸ₯ [ tweet ]
😈 [ cube0x0, Cube0x0 ]

When you spend 2-months of your private time writing a full-featured C2 framework including C++ GUI, Backend, and a C++ PIC agent with custom functions only to end up clueless about what to do with it

πŸ₯ [ tweet ]
😈 [ s4tan, Antonio 's4tan' Parata ]

With the intent to be more transparent, I decided to release the source code of my C2 framework. Don't be evil :) https://t.co/xgbUxkX5Nl

πŸ”— https://github.com/enkomio/AlanFramework

πŸ₯ [ tweet ]
😈 [ last0x00, last ]

Following the news about @microsoft patching the exploit which made @itm4n's PPLDump a reality, it's finally time to make my RIPPL tool public. The project, heavily based off PPLDump, added many offensive functionalities to tamper with EDRs. RIP buddy ❀️

https://t.co/tYEYe0eHQS

πŸ”— https://github.com/last-byte/RIPPL/

πŸ₯ [ tweet ]
😈 [ MDSecLabs, MDSec ]

In part 2 of the How I Met Your Beacon series, we look at some strategies for detecting Cobalt Strike https://t.co/d3GujiN5QO by @domchell

πŸ”— https://www.mdsec.co.uk/2022/07/part-2-how-i-met-your-beacon-cobalt-strike/

πŸ₯ [ tweet ]
😈 [ 80vul, heige ]

DeimosC2 https://t.co/iful3m4ErI DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. D https://t.co/XfMPOwkr0o #ZoomEye Dork

πŸ”— https://github.com/DeimosC2/DeimosC2
πŸ”— https://www.zoomeye.org/searchResult?q=%22%3Ctitle%3EDeimos%20C2%3C%2Ftitle%3E%22

πŸ₯ [ tweet ]
😈 [ cnotin, Clément Notin ]

Just noticed that the amazing "Remediation And Hardening Strategies For Microsoft 365 To Defend Against UNC2452" @Mandiant whitepaper has a version 1.2 with two additional techniques from version 1.1
πŸ“œhttps://t.co/4WhQTixrxE
Awesome reference on #AzureAD, #M365, #ADFS security

πŸ”— https://www.mandiant.com/sites/default/files/2021-11/wp-m-unc2452-000343.pdf

πŸ₯ [ tweet ]