Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
πŸ˜‚πŸ˜‚πŸ˜‚
😁10πŸ”₯1
Offensive Xwitter
πŸ˜‚πŸ˜‚πŸ˜‚
😈 [ Wietze @Wietze ]

Were you aware standard VSCode can be turned into a fully-functioning RAT with a single command?
βœ…Popular/MS-signed exe
βœ…Uses MS network infra
βœ…VSCode is always noisy, abuse may not stand out
πŸ”₯Open/edit/delete files, run arbitrary commands

Solid find:

πŸ”— https://badoption.eu/blog/2023/01/31/code_c2.html

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Clandestine @akaclandestine ]

π˜Όπ™‘/π™€π˜Ώπ™ π™€π™«π™–π™¨π™žπ™€π™£ | π™ˆπ™–π™‘π™¬π™–π™§π™š π˜Ώπ™šπ™«π™šπ™‘π™€π™₯π™’π™šπ™£π™© πŸ‘Ύ

πŸ”— Part 1 - https://medium.com/@0xHossam/av-edr-evasion-malware-development-933e50f47af5

πŸ”— Part 2 - https://medium.com/@0xHossam/av-edr-evasion-malware-development-p2-7a947f7db354

πŸ”— Part 3 - https://medium.com/@0xHossam/unhooking-memory-object-hiding-3229b75618f7

πŸ”— Part 4 - https://medium.com/@0xHossam/av-edr-evasion-malware-development-p-4-162662bb630e

πŸ₯ [ tweet ]
πŸ”₯7
😈 [ Greg Darwin @gregdarwin ]

A new Cobalt Strike blog post just dropped. This is the second in the series on UDRL development, and covers obfuscation and masking. It is accompanied by some major updates to the UDRL-VS kit.

πŸ”— https://www.cobaltstrike.com/blog/revisiting-the-udrl-part-2-obfuscation-masking

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Andrew Oliveau @AndrewOliveau ]

πŸ’₯BOOM!πŸ’₯ Another privilege escalation blog, this time showcasing how to convert arbitrary file deletions πŸ—‘οΈ to SYSTEM command prompt🌈 CVE-2023-27470. Learn about TOCTOU, pseudo-symlinks, MSI rollback exploits, and, of course, how to protect yourselves!

πŸ”— https://www.mandiant.com/resources/blog/arbitrary-file-deletion-vulnerabilities

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ ShorSec Cyber Security @ShorSecLtd ]

πŸ”₯New Blog Post Alert!
The next chapter in our "The Path to DA" series is now live: "(Relaying) To The Internet And Back".
This entry, by @dec0ne, explores yet another route to DA, focusing on the intricacies of ADIDNS Abuse, LDAP relay, RBCD, and more.

πŸ”— https://shorsec.io/blog/the-path-to-da-part-2-relaying-to-the-internet-and-back/

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯1
😈 [ Vincent Yiu @vysecurity ]

DevTunnels, blue are going to begin searching for DevTunnels.ms. Get ready ahead of time and use domains like:

global.rel.tunnels.api.visualstudio.com
tunnels-prod-rel-tm.trafficmanager.net
*.app.github.dev

πŸ”— https://www.syonsecurity.com/post/devtunnels-for-c2

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Rohan Aggarwal @nahoragg ]

My talk "Bypassing Anti-Cheats & Hacking Competitive Games" from @securityfest is now available on Youtube. #game #Hacking

πŸ”— https://youtu.be/bTU7huCmFXA

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ S3cur3Th1sSh1t @ShitSecure ]

Just finished the talk "Playing Chess as Red-Teams" @MCTTP_Con! πŸ”₯ Time to release my PoC to avoid Kernel Callback / ETWti triggered memory scans for process injection - Caro-Kann:

πŸ”— https://github.com/S3cur3Th1sSh1t/Caro-Kann

πŸ₯ [ tweet ]
πŸ‘4
😈 [ Antonio Cocomazzi @splinter_code ]

Excited to share my hardest research about UAC 🀯

"Bypassing UAC with SSPI Datagram Contexts" πŸ”₯

In a nutshell:
βœ… Works on latest Windows 11 down to Windows 7
βœ… Works on both domain-joined and non-domain-joined machines
βœ… Works without using UI hacks or any auto Works without using UI hacks or any auto elevated binary/interface
βœ… Works with maximum UAC level settings *Always Notify*
βœ… Not a security boundary / Won’t Fix

Enjoy the read! πŸ‘‡

πŸ”— https://splintercod3.blogspot.com/p/bypassing-uac-with-sspi-datagram.html

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ an0n @an0n_r0 ]

nothing novel, just playing with screenshot capture in PowerShell: get the screenshot to clipboard by sending PrtSc key using PS, send the image in an HTTP POST body, receive it with least effort using a CGI handler ran by Python http[.]server.

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ SkelSec @SkelSec ]

Weeeee! My Defcon talk is now on Youtube!

πŸ”— https://www.youtube.com/watch?v=7oAZK8x_mL0
πŸ”— https://github.com/skelsec/wsnet
πŸ”— https://github.com/skelsec/wsnet-dotnet

πŸ₯ [ tweet ]

@skelsec Π³Π΅Π½ΠΈΠΉ, indeed
πŸ‘2πŸ”₯1
😈 [ Adam Chester πŸ΄β€β˜ οΈ @_xpn_ ]

My Okta for Red Teamers post is up! We look at how Kerberos SSO works, how to intercept credentials via a fake AD Agent, decrypting AD Agent tokens, adding skeleton key's, and even how to deploy a janky SAML IdP server to auth as any user for good measure.

πŸ”— https://www.trustedsec.com/blog/okta-for-red-teamers/

πŸ₯ [ tweet ]
πŸ”₯2
Offensive Xwitter
😈 [ Adam Chester πŸ΄β€β˜ οΈ @_xpn_ ] My Okta for Red Teamers post is up! We look at how Kerberos SSO works, how to intercept credentials via a fake AD Agent, decrypting AD Agent tokens, adding skeleton key's, and even how to deploy a janky SAML IdP server to auth…
😈 [ јаmΠ΅Ρ• β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ @rotarydrone ]

Awesome stuff πŸ”₯ The AD agent hijack here is much stealthier (and cooler) than injecting a DLL.

Here's a nim example for LogonUser hooking, ala PTASpy or @_xpn_'s blog on AADC for red teams. This also works for the AD agent:

πŸ”— https://gist.githubusercontent.com/rotarydrone/645f77f7e778da75800d1cde4013da2f/raw/a7a12e6e4529f4d09037ee6d908ead89500aa1ad/LogonUserSpy.nim

πŸ₯ [ tweet ][ quote ]
πŸ”₯2
😈 [ Dylan Tran @d_tranman ]

Dug into call stacks spoofing for the past few months and wrote something. Hopefully this is helpful.

πŸ”— https://dtsec.us/2023-09-15-StackSpoofin/

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Greg Darwin @gregdarwin ]

Cobalt Strike 4.9 is now live. This release adds UDRL support for post-ex DLLs, the ability to export Beacon without a reflective loader, support for callbacks, a Beacon data store and more. Check out the blog post for details:

πŸ”— https://www.cobaltstrike.com/blog/cobalt-strike-49-take-me-to-your-loader

πŸ₯ [ tweet ]
πŸ”₯2
ΠŸΡΠΈΡ…Π°Π½ΡƒΠ», ΠΊΠΎΠ³Π΄Π° rpcclient Π² ΠΎΡ‡Π΅Ρ€Π΅Π΄Π½ΠΎΠΉ Ρ€Π°Π· сломался ΠΎ старыС ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ‹, Π° ΡΠ΄Π΅Π»Π°Ρ‚ΡŒ Ρ€Π΅Π·ΠΎΠ»Π² имя↔️сид Π½Π°Π΄ΠΎ Π±Ρ‹Π»ΠΎ здСсь ΠΈ сСйчас:

πŸ”— https://github.com/fortra/impacket/pull/1618
πŸ”₯8😁1