Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ metasploit, Metasploit Project ]

A new LDAP Query module! 🦾
https://t.co/payirwnUQf

πŸ”— https://youtu.be/yYlwZwhycwE

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Have you ever looked for Open Redirects? Try this πŸ‘‡ πŸ’£

#recontips #AttackSurface #bugbountytips #bugbounty #openredirect #recon #httpx

πŸ₯ [ tweet ]
😈 [ SkelSec, SkelSec ]

"It's not a flat network, we have routers" - unnamed client

πŸ₯ [ tweet ]

πŸ€·πŸ»β€β™‚οΈ
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ dekel_paz, Dekel Paz ]

Uploaded a new script that adds vulnerabilities to #BloodHound by parsing scanner reports. Now you can search for vulnerable hosts in your network with paths to Domain Admins!
https://t.co/voN11IR3NL
P.S. did you catch the upcoming #BlueHound spoiler at the end?
@ZeroNetworks

πŸ”— https://github.com/zeronetworks/BloodHound-Tools/tree/main/VulnerabilitiesDataImport

πŸ₯ [ tweet ]
😈 [ Six2dez1, Six2dez ]

My mate @cybersecivan has released a small golang utility to grab the latest trending CVE's from @CVEtrends to easily pipe in your workflow πŸ”₯

Check it out!

https://t.co/6VlyN8ihxW

πŸ”— https://github.com/tr3ss/gofetch

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (1/x) Reanimating ADCSPwn thread (in a simple way) ⏬

You all know this great tool by @_batsec_, but unfortunately Microsoft broke it with one of those anti-PetitPotam patches a while ago ⏬

https://t.co/LeYa5s5sfv

#lpe #adcs #petitpotam #webdav

πŸ”— https://github.com/bats3c/ADCSPwn/issues/3#issuecomment-901713533

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (2/x) So that now the execution hangs like follows ⏬

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (3/x) But guess what, there’s another super cool tool – Coercer (by @podalirius_) – which can be used to trigger the authentication with a different API that is not affected by the ad-hoc check provided in the patch ⏬

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (4/x) And now *tada* I can get my machine account certificate on a fully patched Windows 10 ⏬

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

🧡 (5/x) Check out @Flangvik’s stream to know more about ADCSPwn usage: https://t.co/nG8gRKo3rn

πŸ”— https://youtu.be/W9pUCVxe59Q

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ _dirkjan, Dirk-jan ]

Working on some tooling, and managed to get PRT injection during browser sign-in working with Selenium. If you steal a PRT from a hybrid/compliant device, you can use this to "upgrade" the sign-in of other users, to comply with conditional access policies requiring this status.

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged processes to access malicious pipes for exploitation https://t.co/DtcR08PDTN

πŸ”— https://github.com/crisprss/magicNetdefs

πŸ₯ [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ vxunderground, vx-underground ]

Modern day cyber security explained

πŸ₯ [ tweet ]
😈 [ d4rckh, d4rckh ]

btw, i made a very simple http redirector (also in nim) which can be used with probably any c2 you can imagine
https://t.co/GMfRMpXrSV #redteam

πŸ”— https://github.com/d4rckh/http-redirector

πŸ₯ [ tweet ]
😈 [ tifkin_, Lee Christensen ]

Users password/doc syncing in corporate environments is dangerous. I've seen many corporate users - particularly IT admins - with Chrome Password sync enabled or Last/pass/1pass installed.

The home computer the DA password is synced to that their kids use doesn't have <FancyEDR>

πŸ₯ [ tweet ]
😈 [ vinopaljiri, JiΕ™Γ­ Vinopal ]

Using #Powershell based on .NET >= 5 or .NET Core (so also latest Powershell Linux/Windows) you can easily natively manipulate with PE and do things like in the picture below (ML processing of .data section strings using #StringSifter) πŸ™ƒπŸ™ŒπŸ‘

πŸ₯ [ tweet ]
😈 [ an0n_r0, an0n ]

had to fix couple of bugs of the sideload cmd in Sliver, but now it loads Mimikatz DLL (using Donut behind the scenes) and even bypasses Defender without much effort. it is still not perfect, output fetching is not working for some reason, but it is almost functional.

πŸ₯ [ tweet ]
😈 [ NinjaParanoid, Chetan Nayak (Brute Ratel C4) ]

Amongst all EDRs, SentinelOne applies the most userland hooks, not only in DLLs but also a few other places. So, I decided to make a brief video explaining it's hooks & traps in memory, & how #BruteRatel evades it. Video contains light reversing and dev!!

https://t.co/WdS0z4PSyD

πŸ”— https://www.youtube.com/watch?v=qakZwswi5Jw

πŸ₯ [ tweet ]
😈 [ ORCA10K, ORCA ]

Released a poc on Perun's Fart by #sektor7, that patch ntdll, with a new one read from a suspended process, thus unhooking your syscalls

https://t.co/y3LKQrwOJL

πŸ”— https://gitlab.com/ORCA000/perunsfart

πŸ₯ [ tweet ]