Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ nickvourd, NCV ]

Hello World! This Supernova Beta version... This tool was designed by @nickvourd, @Papadope9 and @IAMCOMPROMISED... Soon the official release...

πŸ”— https://github.com/nickvourd/Supernova

πŸ₯ [ tweet ]
πŸ”₯3πŸ₯±1
😈 [ MDSecLabs, MDSec ]

In our latest post, @breakfix details how we were able to publish a malicious VSCode extension to the marketplace and leverage it for initial access during a red team

πŸ”— https://www.mdsec.co.uk/2023/08/leveraging-vscode-extensions-for-initial-access/
πŸ”— https://vimeo.com/853281700?share=copy

πŸ₯ [ tweet ]
πŸ‘8
Media is too big
VIEW IN TELEGRAM
😈 [ fortunato lodari @flodari ]

Are you tired of failing to create DNS Entry for DavRelay?

LPE with:

ssh -R +
addcomputer.py +
Proxychains +
Proxylite +
PetitPotam +
rbcd_relay


no AV/EDR detection, only SIEM (if) checks on LDAP changes

#redteam #LPE #DAVRelay #FUD

πŸ₯ [ tweet ]

+ Π΄Π΅ΠΌΠΎ Π½Π° ΠΊΠΎΠ±Π΅:

πŸ”— https://threadreaderapp.com/thread/1697922181684936753.html
πŸ”₯10
😈 [ theluemmel, LuemmelSec ]

Lsass Dump against Defender for Endpoint - check
Thanks @tastypepperoni

πŸ”— https://github.com/tastypepperoni/PPLBlade

πŸ₯ [ tweet ]
πŸ”₯2πŸ‘1
Ля ΠΊΠ°ΠΊΠΎΠΉ ΠΏΠΎΠ΄Π³ΠΎΠ½ ΠΎΡ‚ @s0i37 🫢🏻
πŸ”₯17πŸ‘5
😈 [ Synacktiv, Synacktiv ]

During a recent Active Directory intrusion test, @croco_byte was led to devise a new versatile attack vector targeting Group Policy Objects, allowing their exploitation through NTLM relaying.

πŸ”— https://www.synacktiv.com/publications/gpoddity-exploiting-active-directory-gpos-through-ntlm-relaying-and-more

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Tw1sm, Matt Creel ]

Been playing with SQLRecon by @sanjivkawa to learn more about attacking SQL server - awesome tool in an area I haven’t scrutinized enough on tests for creds/lateral movement

Created a Python port, PySQLRecon, while labbing out the attack scenarios

πŸ”— https://github.com/Tw1sm/PySQLRecon

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ Idov31, Ido Veltzman ]

Part 5 of Lord Of The Ring0 is out!

On this part, I explained how APC and thread injection made from the kernel to a user mode process, IRP & SSDT hook, why they don't work anymore (and their alternatives)

#infosec #CyberSecurity

πŸ”— https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ Rasta Mouse @_RastaMouse ]

[BLOG]
Ok, I've written about my experience of battling with both managed and unmanaged memory allocations to try and improve @FuzzySec's Melkor POC.

πŸ”— https://rastamouse.me/building-a-slightly-better-melkor/

πŸ₯ [ tweet ][ quote ]
πŸ”₯2
😈 [ Ash @_bin_Ash ]

We're all just beacons looking for a team server to check in to
πŸ₯Ί πŸ‘‰πŸ‘ˆ

πŸ₯ [ tweet ]

ΠΌΡƒΠ΄Ρ€ΠΎΡΡ‚ΡŒ дня, получаСтся?
😁4πŸ”₯3
😈 [ Kostas @Kostastsale ]

New blog: Understanding Red to Be Better at Blue: Navigating New CrackMapExec Updates

βœ…Keeping up with the red team
βœ…Breaking down CME’s new key features
βœ…From code to behavioural hunting & detections
βœ…Illustrations with examples

πŸ”— https://buff.ly/47Xm6KF

πŸ₯ [ tweet ]
πŸ‘3
πŸ˜‚πŸ˜‚πŸ˜‚
😁10πŸ”₯1
Offensive Xwitter
πŸ˜‚πŸ˜‚πŸ˜‚
😈 [ Wietze @Wietze ]

Were you aware standard VSCode can be turned into a fully-functioning RAT with a single command?
βœ…Popular/MS-signed exe
βœ…Uses MS network infra
βœ…VSCode is always noisy, abuse may not stand out
πŸ”₯Open/edit/delete files, run arbitrary commands

Solid find:

πŸ”— https://badoption.eu/blog/2023/01/31/code_c2.html

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Clandestine @akaclandestine ]

π˜Όπ™‘/π™€π˜Ώπ™ π™€π™«π™–π™¨π™žπ™€π™£ | π™ˆπ™–π™‘π™¬π™–π™§π™š π˜Ώπ™šπ™«π™šπ™‘π™€π™₯π™’π™šπ™£π™© πŸ‘Ύ

πŸ”— Part 1 - https://medium.com/@0xHossam/av-edr-evasion-malware-development-933e50f47af5

πŸ”— Part 2 - https://medium.com/@0xHossam/av-edr-evasion-malware-development-p2-7a947f7db354

πŸ”— Part 3 - https://medium.com/@0xHossam/unhooking-memory-object-hiding-3229b75618f7

πŸ”— Part 4 - https://medium.com/@0xHossam/av-edr-evasion-malware-development-p-4-162662bb630e

πŸ₯ [ tweet ]
πŸ”₯7
😈 [ Greg Darwin @gregdarwin ]

A new Cobalt Strike blog post just dropped. This is the second in the series on UDRL development, and covers obfuscation and masking. It is accompanied by some major updates to the UDRL-VS kit.

πŸ”— https://www.cobaltstrike.com/blog/revisiting-the-udrl-part-2-obfuscation-masking

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Andrew Oliveau @AndrewOliveau ]

πŸ’₯BOOM!πŸ’₯ Another privilege escalation blog, this time showcasing how to convert arbitrary file deletions πŸ—‘οΈ to SYSTEM command prompt🌈 CVE-2023-27470. Learn about TOCTOU, pseudo-symlinks, MSI rollback exploits, and, of course, how to protect yourselves!

πŸ”— https://www.mandiant.com/resources/blog/arbitrary-file-deletion-vulnerabilities

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ ShorSec Cyber Security @ShorSecLtd ]

πŸ”₯New Blog Post Alert!
The next chapter in our "The Path to DA" series is now live: "(Relaying) To The Internet And Back".
This entry, by @dec0ne, explores yet another route to DA, focusing on the intricacies of ADIDNS Abuse, LDAP relay, RBCD, and more.

πŸ”— https://shorsec.io/blog/the-path-to-da-part-2-relaying-to-the-internet-and-back/

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯1
😈 [ Vincent Yiu @vysecurity ]

DevTunnels, blue are going to begin searching for DevTunnels.ms. Get ready ahead of time and use domains like:

global.rel.tunnels.api.visualstudio.com
tunnels-prod-rel-tm.trafficmanager.net
*.app.github.dev

πŸ”— https://www.syonsecurity.com/post/devtunnels-for-c2

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Rohan Aggarwal @nahoragg ]

My talk "Bypassing Anti-Cheats & Hacking Competitive Games" from @securityfest is now available on Youtube. #game #Hacking

πŸ”— https://youtu.be/bTU7huCmFXA

πŸ₯ [ tweet ]
πŸ”₯4