Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ NinjaParanoid, Paranoid Ninja (Brute Ratel C4) ]

Apparently these dumbfucks @GeKarantzas @kpatsak joined my BRc4 channel and started falsifying bug-reports/detections after impersonating one of my clients under the handle redteamdaddy. I feel seriously sorry for anyone who hires this guy. What kind of Uni-Professor does that?

πŸ₯ [ tweet ]
😈 [ VirtualAllocEx, Daniel Feichter ]

Sliver is a nice C2, but I personally can't understand why many people do compare or mess it with Cobalt Strike. Besides Brutel Ratel (BRc4), Cobalt Strike is in my opionion still the C2 leader with the strongest community in the background.

#redteam #itsecurity #pentest

πŸ₯ [ tweet ][ quote ]
😈 [ an0n_r0, an0n ]

some kind of staging: easily injecting a Sliver beacon shellcode (pulled from an http url) into a running process using the ProcessInjection tool by @chiragsavla94 :) https://t.co/L29GbRHkdJ

πŸ”— https://github.com/3xpl01tc0d3r/ProcessInjection

πŸ₯ [ tweet ][ quote ]
πŸ”₯1
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post on how to use Firefox to access internal web apps over SOCKS using NTLM authentication.

https://t.co/8jpKGfWiZW

πŸ”— https://offensivedefence.co.uk/posts/ntlm-auth-firefox/

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1
😈 [ ippsec, ippsec ]

I really hated Linux auditing until I found this. Couple it with Laurel and it becomes really easy to ingest these types of logs. Best of all, logging on linux is so rare most adversaries won't see it coming and get caught instantly. Demo here: https://t.co/G29XsbulRm

πŸ”— https://www.youtube.com/watch?v=lc1i9h1GyMA

πŸ₯ [ tweet ][ quote ]
πŸ‘2
😈 [ tiraniddo, James Forshaw ]

On that note, there are obvious ways of bypassing the mitigation... I would try it on Windows 11 to see if it still worked if I cared enough to install that abomination 😁

πŸ₯ [ tweet ][ quote ]
😈 [ N4k3dTurtl3, NA ]

The possibility of prison time for illegal hacking seems less serious when faced with writing a report for a 9 week assessment.

πŸ₯ [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

I really can't understand why there is so much ego in infosec. Relax, life is short to be pissed off all the time. If you think you are too special just consider there are people out there researching on nuclear physics, applied mathematics, beating diseases without bragging.

πŸ₯ [ tweet ]
πŸ‘1
😈 [ metasploit, Metasploit Project ]

This week's wrap-up has a vCenter Secret Extractor 🀫🀫🀫, named pipe pivoting docs updates πŸ“„ , and service library improvements πŸ“š -- get it here: https://t.co/tbl5VfQKeU

πŸ”— https://www.rapid7.com/blog/post/2022/06/17/metasploit-weekly-wrap-up-162/

πŸ₯ [ tweet ]
πŸ‘1
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

#CME now supports --codec option for execution methods to make the output readable if the target’s OS language is not native English πŸ₯³ πŸŽ‰ Thanks to @mpgn_x64 for merging! https://t.co/cbtvFS1p7z

πŸ”— https://github.com/byt3bl33d3r/CrackMapExec/pull/570

πŸ₯ [ tweet ]
😈 [ C5pider, 5pider ]

Ekko
Sleep Obfuscation by using CreateTimerQueueTimer to queue the ROP Chain that performs the sleep obfuscation.
https://t.co/DiZt4NDDVn

πŸ”— https://github.com/Cracked5pider/Ekko

πŸ₯ [ tweet ]
πŸ‘1
😈 [ ORCA10K, ORCA ]

pew pew https://t.co/iRNCUwiCuU

πŸ”— https://gitlab.com/ORCA000/asmlogger

πŸ₯ [ tweet ][ quote ]
πŸ‘1
😈 [ filip_dragovic, Filip Dragovic ]

Spooler service disabled, RPC filters installed to prevent PetitPotam and File Server VSS Agent Service not installed but you still want to relay DC authentication to ADCS?
Don't worry MS-DFSNM have your back ;)

https://t.co/idwMnM8nIV

πŸ”— https://github.com/Wh04m1001/DFSCoerce

πŸ₯ [ tweet ]
😈 [ hasherezade, hasherezade ]

Now you can use #mal_unpack via dedicated Python wrappers: https://t.co/9wy3DVR2Ez

πŸ”— https://github.com/hasherezade/mal_unpack_py

πŸ₯ [ tweet ][ quote ]
πŸ‘1
😈 [ 0xdf_, 0xdf ]

Paper from @hackthebox_eu is themed on The Office, and is a lot of fun. There's a WordPress vuln, a https://t.co/YmCr3bYY7J bot, and a Polkit CVE. In Beyond root I'll show why it is not vulnerable to PwnKit, and then make it vulnerable and exploit it.

https://t.co/noix1pLv5O

πŸ”— http://Rocket.Chat
πŸ”— https://0xdf.gitlab.io/2022/06/18/htb-paper.html

πŸ₯ [ tweet ]
πŸ‘1
😈 [ DirectoryRanger, DirectoryRanger ]

Windows Credential Dumping, by @jangeisbauer
https://t.co/5eNERw95K5

πŸ”— https://emptydc.com/2022/06/08/windows-credential-dumping/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ SkelSec, SkelSec ]

Pentest framework running entirely* in the browser via @pyodide
OctoPwnWeb has been presented @a41con. This project was in the making for years Support us @porchetta_ind
Talk
https://t.co/l2z0x63cIk
Slides
https://t.co/Nx3Egczptq
Tool
https://t.co/FgZbJHOrsi
*deets in the talk

πŸ”— https://youtu.be/jStdrDHTmD4
πŸ”— https://docs.google.com/presentation/d/1XQFYr_OBI1lrpybsLrHWTWcYNZcF_zOmGDHiIBwSMng
πŸ”— http://octopwn.porchetta.industries/

πŸ₯ [ tweet ]
πŸ‘2
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#Tooling βš”οΈ] Added @jor6PS’s DrawNmap project for visualizing Nmap reports to #DivideAndScan. Dunno whether it’s really needed there, but I was just bored I guess. DrawNmap is cool anyway, take a look: https://t.co/6jW8grFb9F

#nmap #portscan

πŸ”— https://github.com/jor6PS/DrawNmap

πŸ₯ [ tweet ]
πŸ‘3
😈 [ NinjaParanoid, Paranoid Ninja (Brute Ratel C4) ]

A brief explanation on open source Sleep Obfuscation Techniques v/s Brute Ratel C4. Video includes x64dbg and Process Hacker to provide POC!!! Because POC > Shitposting!! Cheers!
https://t.co/1Xizj5CjHJ

πŸ”— https://youtu.be/nB5QHVtN9_g

πŸ₯ [ tweet ]
πŸ‘1
😈 [ an0n_r0, an0n ]

just wanted to see how difficult it is to run CS BOF inside Sliver (tested NoteThief BOF by @trainr3kt). it is super easy! the coff-loader extension in the Sliver armory provides the compatibility layer (code is unchanged), only had to add an ext json: https://t.co/I8dPsvoV3M.

πŸ”— https://github.com/tothi/NoteThief/blob/main/extension.json

πŸ₯ [ tweet ]