Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

[#HackStory 🧡] (1/4) Here’s a generic case of reaching a locked-down PC from a firewalled segment in AD. The background is: 172.16.66.6 (the target) can talk to 192.168.1.11 (a PWNed server) but not vice versa and to no one else in the foreseeable network πŸ‘€

#ad #pentest

πŸ₯ [ tweet ]
πŸ”₯1
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

(2/4) Being a DA an adversary can create an evil GPO that will coerce Immediate Scheduled Task execution on the target. The task downloads and executes a PS cradle pointing to the PWNed server. Sure, there’re fancy (py|Sharp)GPOAbuse, etc… But when it’s a pentest, who cares πŸ˜’

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

(3/4) Meanwhile, some v4tov4 port proxies are configured on the pivot point by the adversary via netsh 😈

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

(4/4) After 90 to 120 minutes the GPO gets applied and the adversary receives a reverse shell / C2 agent on his box with a further ability to spawn a reverse SOCKS proxy πŸŽ‰

πŸ₯ [ tweet ]
πŸ”₯2
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

(5/4) Not the last to be mentioned that GPOs are not the only way to coerce job execution on a group of targets. There’re also some lovely control centers that some commercial AV/EDR developers gently provide pentesters with 🀫

πŸ₯ [ tweet ]
😈 [ mariuszbit, Mariusz Banach ]

πŸ’Ž Can't count in how many Active Directory audits this monstrous Cypher query helped me swiftly collect stats of a #BloodHound collection!⚑

Simply Find & Replace "contoso.com" w/ your target domain aaaand you have it

https://t.co/2ChJ1n7Qzo

Helpful? Lemme know!πŸ’€

πŸ”— https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md

πŸ₯ [ tweet ]
😈 [ 0xdf_, 0xdf ]

Undetected from @hackthebox_eu has me following in the steps of a previous attacker. There's an insecure PHP module, reversing a malicious kernel exploit and a backdoored sshd. Lots of Ghidra and understanding the attackers steps and reusing them.

https://t.co/ItYsl66OVM

πŸ”— https://0xdf.gitlab.io/2022/07/02/htb-undetected.html

πŸ₯ [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

the user said it looked safeπŸ€¦β€β™‚οΈ New PMAT bonus binary sample is up!

Difficulty: 🟨(med)

Available here (the labs are free and always will be):

https://t.co/YvMIe2D0DR

https://t.co/H9OaPt1XtJ

πŸ”— https://github.com/HuskyHacks/PMAT-labs/tree/main/labs/X-X.BonusBinaries/Dropper.installer.msi.malz
πŸ”— https://github.com/HuskyHacks/PMAT-labs

πŸ₯ [ tweet ]
😈 [ cry__pto, Ammar AmerπŸ‡ΈπŸ‡Ύ ]

AMSI Unchained: Review of Known AMSI Bypass Techniques and Introducing a New One
https://t.co/uGpsIOkplP

πŸ”— https://www.blackhat.com/asia-22/briefings/schedule/#amsi-unchained-review-of-known-amsi-bypass-techniques-and-introducing-a-new-one-26120

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg (Shutdown) ]

So apparently Microsoft ninja-patched two things lately in KB5014692 (06/14/2022)
1. ShadowCoerce (auth coercion abusing MS-FSRVP)
2. Self-RBCD trick to bypass limitations of Kerberos Constrained Delegation without Protocol Transition
Identified this with @Geiseric4 and @mkolsek

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

CrackMapExec version 5.3.0 "OPERATION C01NS πŸͺ™" is now public πŸŽ‰πŸŽ‰πŸŽ‰

Lot's of new features and fixed issues. All private features from the @porchetta_ind repo have been integrated to the public repository (rdp, audit mode, laps winrm etc)πŸš€

https://t.co/ozLmJNyUmn

πŸ”— https://github.com/Porchetta-Industries/CrackMapExec/releases/tag/v5.3.0
πŸ”— https://mpgn.gitbook.io/crackmapexec/news-2022/operation-c01ns

πŸ₯ [ tweet ]
😈 [ EricaZelic, malCOM ]

New UAC bypass credited to @filip_dragovic
https://t.co/yVo7xnbWJj

πŸ”— https://github.com/Wh04m1001/IDiagnosticProfileUAC

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Just added the two new AMSI bypass PoC's via Provider Patching into my Amsi-Bypass-Powershell repo. Plus one PoC in Nim as pull request for OffensiveNim:

https://t.co/CSqnqAuUaz

https://t.co/4W8RSPuzVG

Tested both, works perfectly fine. πŸ‘Œ

πŸ”— https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
πŸ”— https://github.com/byt3bl33d3r/OffensiveNim/pull/51

πŸ₯ [ tweet ]
😈 [ mrd0x, mr.d0x ]

Nothing too crazy in this blog post, but thought it may be useful for some people. Enjoy!

Social engineering your way into the network.

https://t.co/uPVBiClrXc

πŸ”— https://mrd0x.com/social-engineering-your-way-into-the-network/

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Easy trick: From Shodan to nuclei one liner πŸ‘‡πŸ”₯

Credits: @pdnuclei, @PhilippeDelteil

#recontips #AttackSurface #shodan #bugbountytips #nuclei #recon

πŸ₯ [ tweet ]