Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
Π‘ΡƒΠΊΠ²Π°Π»ΡŒΠ½ΠΎ Π½Π΅Π΄Π°Π²Π½ΠΎ OWASP Π²Ρ‹ΠΊΠ°Ρ‚ΠΈΠ»ΠΈ Ρ€Π΅Π»ΠΈΠ· Security Top 10 для API. ИзмСния Π½Π΅ сильно большиС, нарисовала ΠΊΠ°Ρ€Ρ‚ΠΈΠ½ΠΎΡ‡ΠΊΡƒ для наглядности 😈
ΠŸΠΎΠ΄Ρ€ΠΎΠ±Π½ΠΎΡΡ‚ΠΈ Π² Π΄ΠΎΠΊΠ°Ρ… https://owasp.org/API-Security/editions/2023/en/0x00-notice/

πŸ₯° всСм пис πŸ₯°
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘6πŸ”₯1
😈 [ _atsika, Atsika ]

I've just started a blog on #maldev and #redteaming. Nothing fancy yet, just me trying to see if I've understood correctly.
The first post is about a custom version of GetModuleHandle and GetProcAddress in #go.
Check it out:

πŸ”— https://blog.atsika.ninja/posts/custom_getmodulehandle_getprocaddress/

πŸ₯ [ tweet ]
πŸ”₯2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ bishopfox, Bishop Fox ]

We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, we’re going even further into how this #RCE vulnerability can be exploited.

Our team created a #python script for generating shellcode given the fixup address and callback URL by calling nasm from Python. The final #exploit with addresses for VPX version 13.1-48.47 is available on our #GitHub.

πŸ”— bfx.social/3YjMxpz

#infosec #Citrix

πŸ₯ [ tweet ]
πŸ”₯4
Offensive Xwitter
😈 [ bishopfox, Bishop Fox ] We just published a detailed analysis of #CVE-2023-3519, which we previously wrote about. Today, we’re going even further into how this #RCE vulnerability can be exploited. Our team created a #python script for generating shellcode…
😈 [ noperator, noperator ]

We're following others by publishing our exploit (and shellcode generator) for the critical-severity CVE-2023-3519, preauth RCE in Citrix ADC Gateway. If you haven't patched yetβ€”do. 🩹

πŸ”— https://github.com/BishopFox/CVE-2023-3519

πŸ₯ [ tweet ][ quote ]
πŸ”₯2
πŸ‘Ή [ snovvcrash, snπŸ₯ΆvvcrπŸ’₯sh ]

FYI, #masscan users. The original masscan does NOT include the β€˜TCP options’ field with MSS value which is required for some hosts to reply to the packet. The fork by @IvreRocks features the --tcpmss switch that includes the mentioned field for your better scope coverage.

For me that’s the masscan version of choice from now on:

πŸ”— https://github.com/ivre/masscan

πŸ₯ [ tweet ]
πŸ”₯10πŸ₯±2πŸ€”1
😈 [ _wald0, Andy Robbins ]

I am proud to announce the release of BloodHound CE!

Blog:

πŸ”— https://posts.specterops.io/bloodhound-community-edition-a-new-era-d64689806e90

Webinar:

πŸ”— https://ghst.ly/3Om0jDo

πŸ₯ [ tweet ]
πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ _wald0, Andy Robbins ]

Have Docker? Run BloodHound CE with one command:

curl -L https://github.com/SpecterOps/BloodHound/raw/main/examples/docker-compose/docker-compose.yml | docker compose -f - up

πŸ₯ [ tweet ]
πŸ”₯9
😈 [ DiLomSec1, Diegolomellini ]

As promised, here is a blogpost on SharpSCCMs new AdminService/CMPivot capabilities. The creator of SharpSCCM, @_Mayyhem and I will be at the SpecterOps booth tomorrow @ 11am and ARSENAL @ 11:30am Thursday presenting SCCM takeover and post-ex techniques

πŸ”— https://medium.com/@dlomellini/lateral-movement-without-lateral-movement-brought-to-you-by-configmgr-9b79b04634c7

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1
😈 [ exploitph, Charlie Clark ]

my latest post on abusing DES using Kerberos, I've not updated my RoastInTheMiddle tool yet but I'll be doing that shortly, enjoy:

πŸ”— https://exploit.ph/des-is-useful.html

πŸ₯ [ tweet ]
πŸ‘5
😈 [ ShitSecure, S3cur3Th1sSh1t ]

Wrote something on how to bypass Google Safe Browsing for Phishing campaigns🧐

πŸ”— https://www.r-tec.net/r-tec-blog-evade-signature-based-phishing-detections.html

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post on using the Process Inject Kit in Cobalt Strike, which I feel is quite under-utilized based on the projects I've seen online.

πŸ”— https://offensivedefence.co.uk/posts/cs-process-inject-kit/

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ joehowwolf, William Burgess ]

New Cobalt Strike blog by @HenriNurmi - Simplifying BOF Development: Debug, Test, and Save Your B(e)acon
All in VS BOF template available in latest Arsenal kit release!

πŸ”— https://www.cobaltstrike.com/blog/simplifying-bof-development

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ garrfoster, Garrett ]

SCCM Site takeover by abusing the AdminService API. In this blog, I walkthrough the discovery process and demonstrate site takeover via credential relaying.

πŸ”— https://medium.com/specter-ops-posts/site-takeover-via-sccms-adminservice-api-d932e22b2bf

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ 0xTriboulet, Steve S. ]

Use C, and some inline assembly, to create a self-extracting shellcode executable!

This solution was inspired by @hasherezade's C to Shellcode method, and was the basis for my solution to @MalDevAcademy's shellcode challenge.

Check it out!

πŸ”— https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ harmj0y, Will Schroeder - ✈ HACKER SUMMER CAMP ]

@tifkin_ , @0xdab0 , and I are very proud to announce that the alpha release of Nemesis is now public! The code is at and we have a post explaining details at 1/3

πŸ”— https://github.com/SpecterOps/Nemesis
πŸ”— https://posts.specterops.io/hacking-with-your-nemesis-7861f75fcab4

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ _xpn_, Adam Chester ]

Second blog post to finish out the week. Expanding on a previous tweet to look at how LAPS 2.0 crypto works, how the PowerShell Get-LAPSADPassword cmdlet works, and provided a quick BOF to do pull and decrypt msLAPS-EncryptedPassword

πŸ”— https://blog.xpnsec.com/lapsv2-internals/

πŸ₯ [ tweet ]
πŸ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ zux0x3a, Lawrence ]

it is tricky to hide a payload content inside rdp connection file!, with some observation it could lead to newer technique to use.

πŸ”— https://0xsp.com/offensive/navigating-embedded-payload-extraction-from-rdp-files-defence-evasion/

πŸ₯ [ tweet ]
πŸ‘4πŸ₯±1
😈 [ _EthicalChaos_, CCob🏴󠁧󠁒󠁷󠁬󠁳󠁿 ]

Thanks to everyone who came to my DEF CON talk yesterday. I should have submitted for a 45 minute talk as I didn't have time to cover the DNS update capability of gssapi-abuse tool. DNS mode is super handy if you want to apply instant updates to AD DNS

πŸ”— https://github.com/CCob/gssapi-abuse#dns-mode

πŸ₯ [ tweet ]
πŸ‘1πŸ”₯1