Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ BushidoToken, Will ]

🍻The feeling all IT workers dread: "After spending Tuesday evening drinking at a restaurant, he realised on his way home that the bag containing the drive was missing". cc @TheBeerFarmers
https://t.co/YJBHalD6L0

πŸ”— https://www.theguardian.com/world/2022/jun/24/japanese-city-worker-loses-usb-containing-personal-details-of-every-resident

πŸ₯ [ tweet ]
😈 [ 0gtweet, Grzegorz Tworek ]

Want to disable the Security Event Log? Almost two years after my original research I finally had a moment to wrap it into a short video. Enjoy :) https://t.co/WnazgfXcPK

πŸ”— https://youtu.be/Wx7gIO71HBg

πŸ₯ [ tweet ][ quote ]
😈 [ _Wra7h, Christian W ]

Add shellcode as a bitmap to the .rsrc section using UpdateResource before spawning as suspended. Parse the header down to the sections, skip past the bitmap shenannigans and then you get your shellcode address.

https://t.co/AoZV4CINip

πŸ”— https://github.com/Wra7h/PEResourceInject

πŸ₯ [ tweet ]
😈 [ eloypgz, Eloy ]

I've playing with AWS security, and found the resources/perms enumeration tools quite limited, so developed https://t.co/D0QLCgTsvu with service filtering and recursion (e.g, automatically check S3 buckets you have access). It is still incomplete, but hope you find it useful.

πŸ”— https://github.com/zer1t0/awsenum

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ 0xdf_, 0xdf ]

Phoenix from @hackthebox_eu involved working around a really slow SQL injection. I'll do some reverse engineering of a WordPress plugin to figure out just the data I need. There's also compiled shell scripts, pam modules config, and wildcard injection.

https://t.co/oAU8XOof2I

πŸ”— https://0xdf.gitlab.io/2022/06/25/htb-phoenix.html

πŸ₯ [ tweet ]
😈 [ mariuszbit, Mariusz Banach ]

☒️ I'm so excited - just issued my first blog post☒️
As promised - sharing my @WarConPL slides deck on:

https://t.co/mynQW0aXsF

Power of positive feedback made me publish them during my first day of holidays (●'β—‘'●)

Let me know if you like it πŸ”₯

πŸ”— https://mgeeky.tech/warcon-2022-modern-initial-access-and-evasion-tactics/

πŸ₯ [ tweet ]
πŸ‘1
😈 [ NorthwaveLabs, Northwave Labs. ]

Cobalt Strike BOF foundation for kernel exploitation using CVE-2021-21551. In its current state, as a PoC, it overwrites the beacon token with the system token (privesc).

https://t.co/JR1Vao7t9c

πŸ”— https://github.com/NorthwaveSecurity/kernel-mii

πŸ₯ [ tweet ]
😈 [ theluemmel, S4U2LuemmelSec ]

Oh holy NimikΓ€tz / custom invoke-mimikatz
If you want the l33t shit for your next engagement you should:
Read -> https://t.co/ZCP5OP1M9e
Read -> https://t.co/8ulbUEyZJY
Use -> https://t.co/WNRJrDGGIz from @danielhbohannon
Use -> private tools from @ShitSecure by sponsoring him

πŸ”— https://s3cur3th1ssh1t.github.io/Bypass-AMSI-by-manual-modification-part-II/
πŸ”— https://s3cur3th1ssh1t.github.io/Building-a-custom-Mimikatz-binary/
πŸ”— https://github.com/danielbohannon/Invoke-Obfuscation

πŸ₯ [ tweet ]
😈 [ mcohmi, Ohm-I (Oh My) ]

New tool drop. Introducing Dumpscan, a wrapper around volatility3 and some other stuff to make dumping certificates way easier. You can read about it here.

https://t.co/CAK4Y2QSJm

πŸ”— https://daddycocoaman.dev/posts/introducing-dumpscan/
πŸ”— https://github.com/daddycocoaman/dumpscan

πŸ₯ [ tweet ]
😈 [ bmcder02, Blake ]

Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ

πŸ”— http://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Detect and block Credential Dumps with Defender for Endpoint & Attack Surface Reduction #DFIR
https://t.co/8BZPvX83Ij

πŸ”— https://jeffreyappel.nl/detect-and-block-credential-dumps-with-defender-for-endpoint-attack-surface-reduction/

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Scheduled Task Tampering
https://t.co/eJvDt166kV

πŸ”— https://labs.f-secure.com/blog/scheduled-task-tampering/

πŸ₯ [ tweet ]
😈 [ daem0nc0re, daem0nc0re ]

Added a small PoC to PrivilegedOperations project.
This PoC is to test SeShutdownPrivilege and tries to cause BSOD.

https://t.co/TYcXE9wUte

πŸ”— https://github.com/daem0nc0re/PrivFu/blob/main/PrivilegedOperations/SeShutdownPrivilegePoC/SeShutdownPrivilegePoC.cs

πŸ₯ [ tweet ]
😈 [ ntlmrelay, Ring3API ]

πŸ“ŒDismember tool by @liam_galvin - scan memory for secrets and more.
βš™οΈhttps://t.co/3anDqypiVb

#redteam #BlueTeam #threathunting #DFIR

πŸ”— https://github.com/liamg/dismember

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

A Syscall Journey in the Windows Kernel, by @AliceCliment
https://t.co/xlGizX3pEm

πŸ”— https://alice.climent-pommeret.red/posts/a-syscall-journey-in-the-windows-kernel/

πŸ₯ [ tweet ]
😈 [ tiraniddo, James Forshaw ]

After @clearbluejar's post of using NtObjectManager for RPC I thought I should finish a post about how a few approaches to narrow down the enumeration to individual running processes rather than having to parse all executables on disk. https://t.co/xh22G6Ek80

πŸ”— https://www.tiraniddo.dev/2022/06/finding-running-rpc-server-information.html

πŸ₯ [ tweet ]