Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

(3/4) Meanwhile, some v4tov4 port proxies are configured on the pivot point by the adversary via netsh 😈

πŸ₯ [ tweet ]
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

(4/4) After 90 to 120 minutes the GPO gets applied and the adversary receives a reverse shell / C2 agent on his box with a further ability to spawn a reverse SOCKS proxy πŸŽ‰

πŸ₯ [ tweet ]
πŸ”₯2
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

(5/4) Not the last to be mentioned that GPOs are not the only way to coerce job execution on a group of targets. There’re also some lovely control centers that some commercial AV/EDR developers gently provide pentesters with 🀫

πŸ₯ [ tweet ]
😈 [ mariuszbit, Mariusz Banach ]

πŸ’Ž Can't count in how many Active Directory audits this monstrous Cypher query helped me swiftly collect stats of a #BloodHound collection!⚑

Simply Find & Replace "contoso.com" w/ your target domain aaaand you have it

https://t.co/2ChJ1n7Qzo

Helpful? Lemme know!πŸ’€

πŸ”— https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md

πŸ₯ [ tweet ]
😈 [ 0xdf_, 0xdf ]

Undetected from @hackthebox_eu has me following in the steps of a previous attacker. There's an insecure PHP module, reversing a malicious kernel exploit and a backdoored sshd. Lots of Ghidra and understanding the attackers steps and reusing them.

https://t.co/ItYsl66OVM

πŸ”— https://0xdf.gitlab.io/2022/07/02/htb-undetected.html

πŸ₯ [ tweet ]
😈 [ HuskyHacksMK, Matt | HuskyHacks ]

the user said it looked safeπŸ€¦β€β™‚οΈ New PMAT bonus binary sample is up!

Difficulty: 🟨(med)

Available here (the labs are free and always will be):

https://t.co/YvMIe2D0DR

https://t.co/H9OaPt1XtJ

πŸ”— https://github.com/HuskyHacks/PMAT-labs/tree/main/labs/X-X.BonusBinaries/Dropper.installer.msi.malz
πŸ”— https://github.com/HuskyHacks/PMAT-labs

πŸ₯ [ tweet ]
😈 [ cry__pto, Ammar AmerπŸ‡ΈπŸ‡Ύ ]

AMSI Unchained: Review of Known AMSI Bypass Techniques and Introducing a New One
https://t.co/uGpsIOkplP

πŸ”— https://www.blackhat.com/asia-22/briefings/schedule/#amsi-unchained-review-of-known-amsi-bypass-techniques-and-introducing-a-new-one-26120

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg (Shutdown) ]

So apparently Microsoft ninja-patched two things lately in KB5014692 (06/14/2022)
1. ShadowCoerce (auth coercion abusing MS-FSRVP)
2. Self-RBCD trick to bypass limitations of Kerberos Constrained Delegation without Protocol Transition
Identified this with @Geiseric4 and @mkolsek

πŸ₯ [ tweet ]
😈 [ mpgn_x64, mpgn ]

CrackMapExec version 5.3.0 "OPERATION C01NS πŸͺ™" is now public πŸŽ‰πŸŽ‰πŸŽ‰

Lot's of new features and fixed issues. All private features from the @porchetta_ind repo have been integrated to the public repository (rdp, audit mode, laps winrm etc)πŸš€

https://t.co/ozLmJNyUmn

πŸ”— https://github.com/Porchetta-Industries/CrackMapExec/releases/tag/v5.3.0
πŸ”— https://mpgn.gitbook.io/crackmapexec/news-2022/operation-c01ns

πŸ₯ [ tweet ]
😈 [ EricaZelic, malCOM ]

New UAC bypass credited to @filip_dragovic
https://t.co/yVo7xnbWJj

πŸ”— https://github.com/Wh04m1001/IDiagnosticProfileUAC

πŸ₯ [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Just added the two new AMSI bypass PoC's via Provider Patching into my Amsi-Bypass-Powershell repo. Plus one PoC in Nim as pull request for OffensiveNim:

https://t.co/CSqnqAuUaz

https://t.co/4W8RSPuzVG

Tested both, works perfectly fine. πŸ‘Œ

πŸ”— https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
πŸ”— https://github.com/byt3bl33d3r/OffensiveNim/pull/51

πŸ₯ [ tweet ]
😈 [ mrd0x, mr.d0x ]

Nothing too crazy in this blog post, but thought it may be useful for some people. Enjoy!

Social engineering your way into the network.

https://t.co/uPVBiClrXc

πŸ”— https://mrd0x.com/social-engineering-your-way-into-the-network/

πŸ₯ [ tweet ]
😈 [ ReconOne_, ReconOne ]

Easy trick: From Shodan to nuclei one liner πŸ‘‡πŸ”₯

Credits: @pdnuclei, @PhilippeDelteil

#recontips #AttackSurface #shodan #bugbountytips #nuclei #recon

πŸ₯ [ tweet ]
😈 [ M4yFly, Mayfly ]

GOAD v2 is out !
You can now test your AD commands and pentest skill on a multi-domain AD lab.
Have fun :)

https://t.co/Rpawi6FFl8
https://t.co/pKN8WwSDli

πŸ”— https://github.com/Orange-Cyberdefense/GOAD
πŸ”— https://mayfly277.github.io/posts/GOADv2/

πŸ₯ [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg (Shutdown) ]

Did you know the WriteOwner ACE doesn't allow to change an object's owner arbitrarily? If userA has that privilege against userB, he can set userB's owner to itself, userA. That's it.
You'd need SeRestorePrivilege to set the owner to any other user.
Thanks @BlWasp_ for the info!

πŸ”— https://github.com/SecureAuthCorp/impacket/pull/1323

πŸ₯ [ tweet ]