Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ bmcder02, Blake ]

Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to capture ETW, useful providers and finding existing trace sessions.
#cybersecurity
https://t.co/3IWn9w6JuQ

πŸ”— http://bmcder.com/blog/a-begginers-all-inclusive-guide-to-etw

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Detect and block Credential Dumps with Defender for Endpoint & Attack Surface Reduction #DFIR
https://t.co/8BZPvX83Ij

πŸ”— https://jeffreyappel.nl/detect-and-block-credential-dumps-with-defender-for-endpoint-attack-surface-reduction/

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

Scheduled Task Tampering
https://t.co/eJvDt166kV

πŸ”— https://labs.f-secure.com/blog/scheduled-task-tampering/

πŸ₯ [ tweet ]
😈 [ daem0nc0re, daem0nc0re ]

Added a small PoC to PrivilegedOperations project.
This PoC is to test SeShutdownPrivilege and tries to cause BSOD.

https://t.co/TYcXE9wUte

πŸ”— https://github.com/daem0nc0re/PrivFu/blob/main/PrivilegedOperations/SeShutdownPrivilegePoC/SeShutdownPrivilegePoC.cs

πŸ₯ [ tweet ]
😈 [ ntlmrelay, Ring3API ]

πŸ“ŒDismember tool by @liam_galvin - scan memory for secrets and more.
βš™οΈhttps://t.co/3anDqypiVb

#redteam #BlueTeam #threathunting #DFIR

πŸ”— https://github.com/liamg/dismember

πŸ₯ [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

A Syscall Journey in the Windows Kernel, by @AliceCliment
https://t.co/xlGizX3pEm

πŸ”— https://alice.climent-pommeret.red/posts/a-syscall-journey-in-the-windows-kernel/

πŸ₯ [ tweet ]
😈 [ tiraniddo, James Forshaw ]

After @clearbluejar's post of using NtObjectManager for RPC I thought I should finish a post about how a few approaches to narrow down the enumeration to individual running processes rather than having to parse all executables on disk. https://t.co/xh22G6Ek80

πŸ”— https://www.tiraniddo.dev/2022/06/finding-running-rpc-server-information.html

πŸ₯ [ tweet ]
😈 [ ORCA10K, ORCA ]

after hiding the payload in the thread description, i decided to search for new places for the same purpose, so im releasing a new poc, that hide your payload in nvidia's gpu memory.
https://t.co/06mPPffWIt

πŸ”— https://gitlab.com/ORCA000/gp

πŸ₯ [ tweet ]
😈 [ n00py1, n00py ]

Do you use AADInternals Invoke-AADIntReconAsOutsider by @DrAzureAD? Surer useful when finding related domains when doing an External Penetration Test.

https://t.co/mWGz0YqhDK

πŸ”— https://o365blog.com/aadinternals/#invoke-aadintreconasoutsider

πŸ₯ [ tweet ]
😈 [ S0ufi4n3, Soufiane Tahiri ]

Here is the code of my #Ransomware simulator: https://t.co/iOlPkPL0xx
I ended up replacing AES with simple XOR.
- Exfiltrating Documents (SMTP and/or FTP)
- Creating/Deleting Volume Shadow Copies
- Encrypting documents
- Dropping a ransomware note to the user's desktop

πŸ”— https://github.com/soufianetahiri/RansomwareSimulator.public

πŸ₯ [ tweet ]
😈 [ bitsadmin, Arris Huijgen ]

New blog post on my experiences with importing and querying large #BloodHound datasets using Neo4j's Cypher query language: https://t.co/Gux8V1ZJSJ. Utilities for importing large dumps available at https://t.co/n7yrzoIDDO.

πŸ”— https://blog.bitsadmin.com/blog/dealing-with-large-bloodhound-datasets
πŸ”— https://github.com/bitsadmin/chophound

πŸ₯ [ tweet ]
😈 [ n00py1, n00py ]

LAPSDumper can now export to CSV. Thanks to @NaisuBanana

https://t.co/sc0YJk5ITX

πŸ”— https://github.com/n00py/LAPSDumper/pull/5

πŸ₯ [ tweet ]
😈 [ daem0nc0re, daem0nc0re ]

Released a PoC for SeTrustedCredmanAccessPrivilege.
This PoC tries to get decrypted DPAPI blob for user account who execute it.
As far as I tested, it seems that SYSTEM integrity level is required to use this privilege.
https://t.co/XivEJdZS4Y

πŸ”— https://github.com/daem0nc0re/PrivFu#privilegedoperations

πŸ₯ [ tweet ]
😈 [ codewhitesec, Code White GmbH ]

Bypassing .NET Serialization Binders: case studies for DevExpress (CVE-2022-28684) and Microsoft Exchange (CVE-2022-23277) by @mwulftange https://t.co/G90Qg7gQ9m

πŸ”— https://codewhitesec.blogspot.com/2022/06/bypassing-dotnet-serialization-binders.html

πŸ₯ [ tweet ]
😈 [ merill, Merill Fernando β€’ πŸ‡¦πŸ‡Ί β€’ πŸ‡±πŸ‡° ]

Trust me. PowerShell is not going to be the same again once you do this.

Update to the latest version of PowerShell and run this command.

Set-PSReadLineOption -PredictionViewStyle ListView

Your entire PowerShell history at your fingertips!

πŸ₯ [ tweet ]
😈 [ splinter_code, Antonio Cocomazzi ]

My blog series "The hidden side of Seclogon" continues with part 3: Racing for LSASS dumps πŸ”₯

Enjoy the read :D

https://t.co/awa5i9ZoJE

πŸ”— https://splintercod3.blogspot.com/p/the-hidden-side-of-seclogon-part-3.html

πŸ₯ [ tweet ]
😈 [ SEKTOR7net, SEKTOR7 Institute ]

"Things that were hard to bear are sweet to remember."
- Seneca Minor

πŸ₯ [ tweet ][ quote ]
😈 [ metasploit, Metasploit Project ]

EfsPotato-efspotahto
https://t.co/1yskSWb6qD

πŸ”— https://youtu.be/QVorNIfY5Ow

πŸ₯ [ tweet ]