Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ BlWasp_, BlackWasp ]

I've added the last *Potato exploits to my article which follows the various developments regarding these EoP techiques. Normally up-to-date with the recents JuicyPotatoNG, CertPotato and LocalPotato : https://t.co/xRR41cr3Cm

๐Ÿ”— https://hideandsec.sh/books/windows-sNL/page/in-the-potato-family-i-want-them-all

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ShitSecure, S3cur3Th1sSh1t ]

This inspired me to make it Powershell Add-Type compatible:

https://t.co/RBPe0kXXhj

Easy Hardware Breakpoint AMSI bypass for everyone ๐Ÿค“

๐Ÿ”— https://gist.github.com/susMdT/360c64c842583f8732cc1c98a60bfd9e
๐Ÿ”— https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell#Using-Hardware-Breakpoints

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ BHinfoSecurity, Black Hills Information Security ]

BHIS | Tester's Blog
Have you ever encountered a situation where port forwarding limited your pivot attempts? How did you manage to overcome this limitation?

Forwarding Traffic Through SSH
by: @nand0ps
Published: 2/23/2023

Learn more: https://t.co/mvjIz6kR5y

๐Ÿ”— https://www.blackhillsinfosec.com/forwarding-traffic-through-ssh/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ Tract0r_, Tract0r ]

I've written a new blog post about Sacrificial Sessions.
If you would like to know more about how to not mess up with Kerberos tickets on your next engagement, check it out.
https://t.co/au3au48ljh

๐Ÿ”— https://unshade.tech/sacrificial-session

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ VakninHai, Hai vaknin ]

me and @cybergentix just published Lateral movement using Internet Explorer DCOM object and StdRegProv
#redteam
#Security

https://t.co/pm5AAHUX9N

๐Ÿ”— https://link.medium.com/1vF0htMuExb

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ 0xdf_, 0xdf ]

Awkward is all about web exploitation, with auth bypass, jwt forging into awk injection, and command injection. In Beyond Root, I'll show two unintended paths (one patched, one not) that are fun learning opportunities as well.

https://t.co/rEqywcTkoV

๐Ÿ”— https://0xdf.gitlab.io/2023/02/25/htb-awkward.html

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ secu_x11, Secu ]

The Kraken has been released! A modular multi-language webshell (PHP, JSP, ASPX) focused on web post-exploitation and defense evasion.

https://t.co/AcN0hNdPre

๐Ÿ”— https://github.com/kraken-ng/Kraken

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ2
๐Ÿ˜ˆ [ David3141593, David Buchanan ]

python memfd_create() oneliner:

python3 -c "import os;os.fork()or(os.setsid(),print(f'/proc/{os.getpid()}/fd/{os.memfd_create(str())}'),os.kill(os.getpid(),19))"

This prints the path of a memfd, which you can use to do whatever you want (like fileless ELF execution!)

๐Ÿฅ [ tweet ]
๐Ÿคฏ2
Offensive Xwitter
๐Ÿ˜ˆ [ Tyl0us, Matt Eidelberg ] I've had so much fun learning rust. This is an excellent example of the power of rust, no EDR unhooking, patching of ETW, syscalls, or LITCRYPT and it calls home against EDRs. More to come soon #redteam ๐Ÿฅ [ tweet ] ะดะฐะฒะฝะพ ะฟะพั€ะฐโ€ฆ
ะงะต, ะฟะฐั†ะฐะฝั‹, ะฐะฝะธะผะต?

ะŸะพะบะฐ ะตั‰ะต ะฑะตัะฟะปะฐั‚ะฝั‹ะน ะบัƒั€ั ะฟะพ ั€ะฐัั‚ัƒ ะพั‚ ะ ะฐัั‚ั‹, ั€ะตะบะพะผะตะฝะดัƒัŽ โฌ‡๏ธ

๐Ÿ”— https://training.zeropointsecurity.co.uk/courses/take/rust-for-n00bs

UPD. ะ˜ ะฒ ะดะพะณะพะฝะบัƒ ะตั‰ะต ะฟะปะตะนะปะธัั‚ ะพั‚ 0xdf ะฟะพ AOC2015 ะฝะฐ ั€ะฐัั‚ะต โฌ‡๏ธ

๐Ÿ”— https://www.youtube.com/playlist?list=PLJt6nPUdQbiSLYLKKRfydWeMOBwOjzM2y

#rust #courses
๐Ÿ”ฅ1๐Ÿคฏ1
๐Ÿ˜ˆ [ hetmehtaa, Het Mehta ]

Firefox Add-ons For Penetration Testers ๐ŸฆŠ

#Infosec #Firefox #Bugbounty #TheSecureEdge

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ1
Offensive Xwitter
๐Ÿ˜ˆ [ David3141593, David Buchanan ] python memfd_create() oneliner: python3 -c "import os;os.fork()or(os.setsid(),print(f'/proc/{os.getpid()}/fd/{os.memfd_create(str())}'),os.kill(os.getpid(),19))" This prints the path of a memfd, which you can use to doโ€ฆ
๐Ÿ˜ˆ [ CraigHRowland, Craig Rowland - Agentless Linux Security ]

Nice variant of memfd_create fileless attack on Linux.

Here are some things to try to find this on a box:

ls -alR /proc/*/fd 2> /dev/null | grep "memfd: (deleted)"

grep "memfd_create" /proc/*/cmdline

strings /proc/PID/cmdline

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ˜ˆ [ ZeroMemoryEx, V2 ]

New AMSI lifetime bypass, it works by searching for the first byte of each instruction to prevent updates from affecting it, Check it out.
#amsi #redteam #cybersecurity
https://t.co/J6lBOXWFyx

๐Ÿ”— https://github.com/ZeroMemoryEx/Amsi-Killer

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ 0xdeaddood, leandro ]

๐Ÿ“ New blog post! Let's talk about NTLM authentication coercion methods using Impacket.

Somedays ago, we updated mssqlclient[.]py with many new commands. Among them, the xp_dirtree option was added. MSSQL and xp_dirtree, you know the rest ๐Ÿ˜‰.

https://t.co/hbfSi3YTRC

๐Ÿ”— https://0xdeaddood.rocks/2023/02/28/relaying-everything-coercing-authentications-episode-1-mssql/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ pdiscoveryio, ProjectDiscovery.io ]

An in-depth guide to subfinder: Beginner to advanced ๐Ÿš€

What's all this about?
โœ… Installation
โœ… Navigating subfinder
โœ… Output options
โœ… Advanced options

Let us know in the comments if we missed anything ๐Ÿ‘‡
https://t.co/ZKZd33KRfH

๐Ÿ”— https://blog.projectdiscovery.io/do-you-really-know-subfinder-an-in-depth-guide-to-all-features-of-subfinder-beginner-to-advanced/

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ CrowdStrike, CrowdStrike ]

๐Ÿšจ The 2023 Global Threat Report is now live.

Discover the latest activities of the worldโ€™s most dangerous adversaries and CrowdStrikeโ€™s recommendations for protecting your business against modern attacks.

Access the report: https://t.co/Wa7tkn56NZ

๐Ÿ”— https://crwdstr.ke/60123vKer

๐Ÿฅ [ tweet ]
๐Ÿ˜ˆ [ ShitSecure, S3cur3Th1sSh1t ]

Just added an Offensive Hooking example to the OffensiveNim repo:

https://t.co/5i294uVf1b

๐Ÿ”— https://github.com/byt3bl33d3r/OffensiveNim/pull/57

๐Ÿฅ [ tweet ]