Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ an0n @an0n_r0 ]

my favorite (and might be the most complete) wifi hacking guide (+pwnbox setup) by @Xst3nZ:

πŸ”— https://github.com/koutto/pi-pwnbox-rogueap/wiki

following this it was relatively easy to perform an evil twin attack after setting up a wpa-eap home lab (managed to capture a challenge using eaphammer πŸ™‚).

πŸ₯ [ tweet ]
πŸ‘6
😈 [ Felipe Molina @felmoltor ]

Great reading about Sliver and OSEP:

πŸ”— https://bishopfox.com/blog/passing-the-osep-exam-using-sliver

πŸ₯ [ tweet ]
πŸ”₯10
😈 [ Maxime Meignan @th3m4ks ]

How to disable some parts of EDR’s telemetry on Windows 10? Just ask nicely!
See for more info about an interesting logic bug we found on Win10 that affects all EDRs πŸ˜‰

πŸ”— https://www.riskinsight-wavestone.com/en/2023/10/a-universal-edr-bypass-built-in-windows-10/

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ TrustedSec @TrustedSec ]

Our new #blog post by @mega_spl0it and @4ndr3W6S takes a deep dive into how Active Directory (AD) attribute-based detections can be built and how to identify where an adversary may be hiding. Read the first of this 3-part series now!

πŸ”— https://hubs.la/Q024-06m0

πŸ₯ [ tweet ]
πŸ‘4
😈 [ ippsec @ippsec ]

Uploaded a video talking about the Looney Tunable exploit. Don't go deep into the exploit but analyze the script/shellcode to make sure its not malicious, update offsets if your target isn't supported, and generic+specific detections to this.

πŸ”— https://youtu.be/1iV-CD9Apn8

πŸ₯ [ tweet ]
πŸ‘1
😈 [ Chetan Nayak (Brute Ratel C4 Author) @NinjaParanoid ]

Since Cobaltstrike v4.9 is leaked and sooner or later it will be exploited, here is the detection for beacon's core. This detection cannot be modified with malleable profiles. EDRs like Crowdstrike/Elastic/MDATP which constantly scan the memory region for known patterns should easily pick this up. FYI, if BRc4 gets leaked, I would do the same for BRc4 too, like I've done in the past. No hard feelings, just helping the community.

πŸ”— https://github.com/paranoidninja/Cobaltstrike-Detection/blob/main/cs49.yara
πŸ”— https://github.com/paranoidninja/Cobaltstrike-Detection/blob/main/scan_process.c

πŸ₯ [ tweet ]
πŸ‘4
😈 [ Charlie Bromberg Β« Shutdown Β» @_nwodtuhs ]

pyWhisker can now do cross-domain shadow credentials πŸ‘οΈπŸ«¦πŸ‘οΈ

pywhisker.py --action add -d domainA -u owned_user -p password --target user_in_domainB --target-domain domainB

πŸ”— https://github.com/ShutdownRepo/pywhisker

πŸ₯ [ tweet ]
πŸ”₯8
ΠšΠΎΠΌΡƒ Π½Π΅ΠΌΠ½ΠΎΠ³ΠΎ ΠΊΠΈΡ€ΠΈΠ»Π»ΠΈΡ†Ρ‹ для Havoc?

πŸ”— https://github.com/snovvcrash/Havoc/commit/438f52b8e68110862dfbb841dd5b440e9c9f3ca1

Ну ΠΈ фикс для InvokeAssembly Π΄ΠΎ ΠΊΡƒΡ‡ΠΈ:

πŸ”— https://github.com/snovvcrash/HavocModules/commit/dc017e254660bb7f416b8d04e27c15c388e849ef
πŸ”₯14
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯8πŸ‘1πŸ₯±1
😈 [ Mayfly @M4yFly ]

GOAD update available πŸ₯³
- Azure provider is now supported thx to @Zeph_RooT !
- Two versions of the lab are available (A light version with 3 computers has been added).
- Some scripts to help install.
- Refactoring to simplify adding lab and providers.

πŸ”— https://github.com/Orange-Cyberdefense/GOAD

πŸ₯ [ tweet ]
πŸ‘7
Offensive Xwitter
😈 [ TrustedSec @TrustedSec ] In Part 2 of our new #blog series by @mega_spl0it and @4ndr3W6S, they build detections for additional attributes, this time focusing on those that can be modified using the #PowerMad tool. Read it now! πŸ”— https://hubs.ly/Q025hFdr0…
😈 [ TrustedSec @TrustedSec ]

In the third and final installment of our #blog series by @mega_spl0it @4ndr3W6S DACL-based detections are built, identifying attacks that focus on obscure or lesser-known AD Attributes that fall outside of the scope of Parts 1 and 2. Read it now!

πŸ”— https://hubs.la/Q025N0lk0

πŸ₯ [ tweet ]
πŸ”₯4πŸ‘1
😈 [ Check Point Research @_CPResearch_ ]

CP<r> introduces a new method for running hidden implanted code in #ReadyToRun (R2R) compiled .NET binaries ➑️ R2R stomping ⬅️

πŸ€“Implementation and resulting problems
πŸ› οΈTechniques and tools to analyze R2R stomped Assemblies
⚠️Detecting R2R stomping

πŸ”— https://research.checkpoint.com/2023/r2r-stomping-are-you-ready-to-run/

πŸ₯ [ tweet ]
πŸ‘1
Offensive Xwitter
😈 [ Chetan Nayak (Brute Ratel C4 Author) @NinjaParanoid ] Since Cobaltstrike v4.9 is leaked and sooner or later it will be exploited, here is the detection for beacon's core. This detection cannot be modified with malleable profiles. EDRs like Crowdstrike/Elastic/MDATP…
😈 [ Florian Roth @cyb3rops ]

Teaser: we're working on a new #YARA module to enhance in-memory matching, allowing detection engineers to craft more precise rules. Stay tuned

πŸ₯ [ tweet ]

ΠΊΠΎΠ³Π΄Π° Π½Π°Π²Π΅Π» суСты...
😁2
😈 [ Elliot @ElliotKillick ]

Perfect DLL Hijacking: It's now possible with the latest in security research. Building on previous insights from @NetSPI, we reverse engineer the Windows library loader to disable the infamous Loader Lock and achieve ShellExecute straight from DllMain.

πŸ”— https://elliotonsecurity.com/perfect-dll-hijacking/

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ S3cur3Th1sSh1t @ShitSecure ]

Another loader using Stomping + Threadlessinject as feature combination plus some bonus like encryption and module unlinking πŸ”₯by @BlackSnufkin42 πŸ‘

πŸ”— https://github.com/BlackSnufkin/NovaLdr

πŸ₯ [ tweet ]
πŸ”₯2