Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ Check Point Research @_CPResearch_ ]

CP<r> introduces a new method for running hidden implanted code in #ReadyToRun (R2R) compiled .NET binaries ➑️ R2R stomping ⬅️

πŸ€“Implementation and resulting problems
πŸ› οΈTechniques and tools to analyze R2R stomped Assemblies
⚠️Detecting R2R stomping

πŸ”— https://research.checkpoint.com/2023/r2r-stomping-are-you-ready-to-run/

πŸ₯ [ tweet ]
πŸ‘1
Offensive Xwitter
😈 [ Chetan Nayak (Brute Ratel C4 Author) @NinjaParanoid ] Since Cobaltstrike v4.9 is leaked and sooner or later it will be exploited, here is the detection for beacon's core. This detection cannot be modified with malleable profiles. EDRs like Crowdstrike/Elastic/MDATP…
😈 [ Florian Roth @cyb3rops ]

Teaser: we're working on a new #YARA module to enhance in-memory matching, allowing detection engineers to craft more precise rules. Stay tuned

πŸ₯ [ tweet ]

ΠΊΠΎΠ³Π΄Π° Π½Π°Π²Π΅Π» суСты...
😁2
😈 [ Elliot @ElliotKillick ]

Perfect DLL Hijacking: It's now possible with the latest in security research. Building on previous insights from @NetSPI, we reverse engineer the Windows library loader to disable the infamous Loader Lock and achieve ShellExecute straight from DllMain.

πŸ”— https://elliotonsecurity.com/perfect-dll-hijacking/

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ S3cur3Th1sSh1t @ShitSecure ]

Another loader using Stomping + Threadlessinject as feature combination plus some bonus like encryption and module unlinking πŸ”₯by @BlackSnufkin42 πŸ‘

πŸ”— https://github.com/BlackSnufkin/NovaLdr

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Outflank @OutflankNL ]

We’ve pushed β€œRemotePipeList” on our GitHub and released a blog post. The tools is used to list named pipes of remote systems. Useful for remote reconnaissance.

Blog post here
C2 Tool Collection here

πŸ”— https://outflank.nl/blog/2023/10/19/listing-remote-named-pipes/
πŸ”— https://github.com/outflanknl/C2-Tool-Collection/tree/main/Other/RemotePipeList

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Andrew @4ndr3w6S ]

Happy to finally share our slide
deck/demo videos from our @texascyber talk, β€œYou DISliked DCSync? Wait For NetSync!”

Thank you x3000 to @MindsEyeCCF, for help with the fantastic slides, & my co-presenter/friend/mentor/research partner @exploitph πŸ€—

πŸ”— https://github.com/4ndr3w6/Presentations/tree/main/Texas_Cyber_Summit_2023

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯2
😈 [ Antonio Cocomazzi @splinter_code ]

Do you want to start the RemoteRegistry service without Admin privileges?
Just write into the "winreg" named pipe πŸ‘†

πŸ₯ [ tweet ]
🀯13😁1
😈 [ Tony Gore @nullg0re ]

Dcsync without triggering traditional alerts?

πŸ”— https://nullg0re.com/2023/09/hijacking-someone-else-dcsync/

πŸ₯ [ tweet ]
😈 [ Kleiton Kurti @kleiton0x7e ]

Spent some time reversing undocumented Syscalls residing in Kernel32/Ntdll and created a PoC for proxying DLL loads. This leads to a clean call stack as the return address pointing to shellcode won't be pushed to stack.

#CyberSecurity #redteam #infosec

πŸ”— https://github.com/kleiton0x00/Proxy-DLL-Loads

πŸ₯ [ tweet ]
πŸ‘4πŸ”₯1
😈 [ spencer @techspence ]

A .net port of @ZeroMemoryEx AMSI Killer with an added feature to continuously patch new powershell processes by @S1lky_1337

πŸ”— https://github.com/S1lkys/SharpKiller
πŸ”— https://github.com/ZeroMemoryEx/Amsi-Killer

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ N1k0la @webdxg ]

Exchange Server CVE-2023-36745

Standing on the Shoulder of Giants @chudyPB

πŸ”— https://n1k0la-t.github.io/2023/10/24/Microsoft-Exchange-Server-CVE-2023-36745/

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ Mayfly @M4yFly ]

A new Lab 🏰 is available on GOAD: NHA.
This time it is a challenge, 5 vms, you start with no account and try to get domain admin on the two domains.

Have fun !

πŸ”— https://github.com/Orange-Cyberdefense/GOAD/tree/main/ad/NHA

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Garrett @garrfoster ]

Pushed an update to SCCMHunter to include @SkelSec's python unobfuscator for @_xpn_'s sccmwtf NAA attack. Shout out to you both for the awesome work!

πŸ”— https://github.com/garrettfoster13/sccmhunter
πŸ”— https://github.com/xpn/sccmwtf/blob/main/policysecretunobfuscate.py

πŸ₯ [ tweet ]
πŸ‘4πŸ”₯1
😈 [ Justin Elze @HackingLZ ]

wmiexec is so reliable with so many great detections avaliable. Cortex does a really good job without of the box Impacket as well.

πŸ”— https://www.crowdstrike.com/blog/how-to-detect-and-prevent-impackets-wmiexec/
πŸ”— https://micahbabinski.medium.com/brace-for-impacket-5191dff82c74

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Bo0oM @i_bo0om ]

A photo of my burp suite key

πŸ₯ [ tweet ]

#burp #suite #professional #license #key #file #crack #download
😁14πŸ₯±5πŸ”₯3
😈 [ Benjamin Watson @nebshell ]

This is nice

πŸ”— https://x64.syscall.sh/

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘1