Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://xn--r1a.website/OffensiveTwitter/546
Download Telegram
😈 [ SemperisTech, Semperis ]

Privilege escalation is a prime tool for attackers to infiltrate your #ActiveDirectory--and from there, anything they want. Learn more about a vulnerability that can enable #cyberattackers to target AD Certificate Services and take over your domain. https://t.co/rwUp9tIiAn

πŸ”— https://www.semperis.com/blog/ad-vulnerability-cve-2022-26923/

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ nikhil_mitt, Nikhil Mittal ]

TIL that it is possible to exclude Account Operators, Server Operators, Print Operators and Backup Operators from SDProp/AdminSDHolder! #ActiveDirectory #RedTeam
https://t.co/kzatGP3RfD

πŸ”— https://petri.com/active-directory-security-understanding-adminsdholder-object/

πŸ₯ [ tweet ]
😈 [ PrzemysΕ‚aw KΕ‚ys @PrzemyslawKlys ]

If you're into #ActiveDirectory, keep it clean from stale objects. CleanupMonster, my new #PowerShell module, can help you with that. I wrote a blog post about it to make it easier to implement.

It has fancy reporting and lots of customizations:

πŸ”— https://evotec.xyz/mastering-active-directory-hygiene-automating-stale-computer-cleanup-with-cleanupmonster/

πŸ₯ [ tweet ]
πŸ‘7
😈 [ Logan Goins @_logangoins ]

I just published a blog post focused on details of using offensive .NET for both enumeration and exploitation of #activedirectory environments! Including some customized code examples from a tool I've been developing!

πŸ”— https://logan-goins.com/2024-10-11-Dotnet-AD/
πŸ”— https://github.com/logangoins/Cable

πŸ₯ [ tweet ]

#для_самых_ΠΌΠ°Π»Π΅Π½ΡŒΠΊΠΈΡ…
πŸ‘5πŸ”₯1