Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ fluepke, @fluepke@chaos.social ]

Discovered by a fried of mine:

CVE-2022-26138: A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group

The password is disabled1system1user6708

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ cfalta, Christoph Falta ]

I wrote something to compare the content of two volume shadow copies. Let's hope that's useful πŸ˜… #dfir #PowerShell
https://t.co/ip15QPFaTq

πŸ”— https://github.com/cfalta/vsctool

πŸ₯ [ tweet ]
😈 [ filip_dragovic, Filip Dragovic ]

Just another way to abuse SeImpersonate privilege...
https://t.co/Q175DkLnyX

Hard work is done by crisprss (dont know twitter handle) , i simply found way to weaponize it. :)

πŸ”— https://github.com/Wh04m1001/DiagTrackEoP

πŸ₯ [ tweet ]
😈 [ MDSecLabs, MDSec ]

In part 1 of this blog series, @domchell provides an overview on detecting beacons https://t.co/hsTgTqQKs7

πŸ”— https://www.mdsec.co.uk/2022/07/part-1-how-i-met-your-beacon-overview/

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#HackTip βš’] When there’s not much info revealed about AD sites from CME subnets module, we can combine @_dirkjan’s adidnsdump with @pdiscoveryio mapcidr to get a nicely formatted list of the target intranetworks πŸ•Έ

#ad #dns

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ mpgn_x64, mpgn ]

Me after writing ONE vulnerablity out of 10 for the pentest report

πŸ₯ [ tweet ]

Π–ΠΈΠ·Π° ΠΆΠ΅ Π½Ρƒ
πŸ”₯3
😈 [ mpgn_x64, mpgn ]

Don't try me 😜

πŸ₯ [ tweet ][ quote ]
😈 [ 0xdf_, 0xdf ]

The best part of Catch from @hackthebox_eu is poisoning a config such that the server uses my VM for Redis, and serving a serialized PHP object to get RCE. There's several paths, and lots of interesting exploitation.

https://t.co/hRViK12SW6

πŸ”— https://0xdf.gitlab.io/2022/07/23/htb-catch.html

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Self-removing PE's with Remote Thread Injection
https://t.co/wSBqhFOl5b

πŸ”— http://0xthem.blogspot.com/2014/10/self-delete-pe.html

πŸ₯ [ tweet ]
😈 [ itm4n, Clément Labro ]

The July 2022 update of Windows 10/11 killed PPLdump πŸ’€πŸ˜’

Find out how in this blog post...
πŸ‘‰ https://t.co/o0izvkkSm0

πŸ”— https://itm4n.github.io/the-end-of-ppldump/

πŸ₯ [ tweet ]
😈 [ cube0x0, Cube0x0 ]

When you spend 2-months of your private time writing a full-featured C2 framework including C++ GUI, Backend, and a C++ PIC agent with custom functions only to end up clueless about what to do with it

πŸ₯ [ tweet ]
😈 [ s4tan, Antonio 's4tan' Parata ]

With the intent to be more transparent, I decided to release the source code of my C2 framework. Don't be evil :) https://t.co/xgbUxkX5Nl

πŸ”— https://github.com/enkomio/AlanFramework

πŸ₯ [ tweet ]
😈 [ last0x00, last ]

Following the news about @microsoft patching the exploit which made @itm4n's PPLDump a reality, it's finally time to make my RIPPL tool public. The project, heavily based off PPLDump, added many offensive functionalities to tamper with EDRs. RIP buddy ❀️

https://t.co/tYEYe0eHQS

πŸ”— https://github.com/last-byte/RIPPL/

πŸ₯ [ tweet ]
😈 [ MDSecLabs, MDSec ]

In part 2 of the How I Met Your Beacon series, we look at some strategies for detecting Cobalt Strike https://t.co/d3GujiN5QO by @domchell

πŸ”— https://www.mdsec.co.uk/2022/07/part-2-how-i-met-your-beacon-cobalt-strike/

πŸ₯ [ tweet ]
😈 [ 80vul, heige ]

DeimosC2 https://t.co/iful3m4ErI DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. D https://t.co/XfMPOwkr0o #ZoomEye Dork

πŸ”— https://github.com/DeimosC2/DeimosC2
πŸ”— https://www.zoomeye.org/searchResult?q=%22%3Ctitle%3EDeimos%20C2%3C%2Ftitle%3E%22

πŸ₯ [ tweet ]
😈 [ cnotin, Clément Notin ]

Just noticed that the amazing "Remediation And Hardening Strategies For Microsoft 365 To Defend Against UNC2452" @Mandiant whitepaper has a version 1.2 with two additional techniques from version 1.1
πŸ“œhttps://t.co/4WhQTixrxE
Awesome reference on #AzureAD, #M365, #ADFS security

πŸ”— https://www.mandiant.com/sites/default/files/2021-11/wp-m-unc2452-000343.pdf

πŸ₯ [ tweet ]
😈 [ LittleJoeTables, Moloch ]

Offline implant builds now supported out of the box in Sliver thanks to @capnspacehook

https://t.co/5MjdULcdXc

πŸ”— https://github.com/BishopFox/sliver/releases/tag/v1.5.21

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Public Cloud Services Comparison
https://t.co/JNYNTXm5O7

πŸ”— https://comparecloud.in/

πŸ₯ [ tweet ]
😈 [ _dirkjan, Dirk-jan ]

Apparently ldapdomaindump is part of the top ~3800 Python packages globally based on downloads. Happy that many people use it, though I suspect many have it as a dependency somewhere without knowing.

πŸ₯ [ tweet ]