Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ Chris Au @netero_1010 ]

Made a tool to create/modify schedule task using just registry keys. It has some requirements (require SYSTEM) but the beauty of it is it wont generate schedule task creation event log.

πŸ”— https://github.com/netero1010/GhostTask

πŸ₯ [ tweet ]
πŸ”₯4πŸ‘2πŸ₯±1
😈 [ Fabian @testert01 ]

[Blogpost] EvtPsst a small EventLog Process Mute tool without OpenProcess call to the EventLog process.

This blog shows how to elevate a SYNCHRONIZE handle to a full process handle with a process token of EventLog.

πŸ”— https://nothingspecialforu.github.io/EvtPsstBlog/

πŸ₯ [ tweet ]
πŸ”₯3πŸ‘2
😈 [ Corben Leo @hacker_ ]

I've made $500k+ from #SSRF vulnerabilities.

Here are my tricks:

πŸ”— https://threadreaderapp.com/thread/1694554700555981176.html

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Matthew @embee_research ]

Unpacking .NET Malware Using Process Hacker and Dnspy.

An easy method to obtain unpacked .NET samples by leveraging Process Hacker to identify suspicious modules, and Dnspy to save them from memory.

πŸ”— https://embee-research.ghost.io/unpacking-net-malware-with-process-hacker/

πŸ₯ [ tweet ]
πŸ‘3
😈 [ n00py @n00py1 ]

The craziest BloodHound art I've made yet (password sharing clusters)

πŸ₯ [ tweet ]

ΠΏΠ»Π°Π³ΠΈΠ°Ρ‚ - ΠΎΡ‡Π΅Π²ΠΈΠ΄Π½ΠΎ ΠΆΠ΅, Ρ‡Ρ‚ΠΎ это Волосатый Π±ΡƒΠ±Π»ΠΈΠΊ
πŸ”₯6
😈 [ Almond OffSec @AlmondOffSec ]

Understanding the different types of LDAP authentication methods is fundamental to apprehend subjects such as relay attacks or countermeasures. This post by @lowercase_drm introduces them through the lens of Python libraries.

πŸ”— https://offsec.almond.consulting/ldap-authentication-in-active-directory-environments.html

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ sinusoid @the_bit_diddler ]

Ever wanted to create Defender exclusions non-interactively?

Support for local and remote systems? βœ”οΈ
Ability to revert said changes? βœ”οΈ
Support processes, paths, and extensions? βœ”οΈ
BOF? βœ”οΈ
C# βœ”οΈ

Code is public:

πŸ”— https://github.com/EspressoCake/DefenderPathExclusions
πŸ”— https://github.com/EspressoCake/Defender-Exclusions-Creator-BOF

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ Craig Rowland - Agentless Linux Security @CraigHRowland ]

Daily Linux whoami:

$(echo -e "\x2f\x75\x73\x72\x2f\x62\x69\x6e\x2f\x77\x68\x6f\x61\x6d\x69")


πŸ₯ [ tweet ]
😁5πŸ”₯1
Offensive Xwitter
😈 [ Antonio Cocomazzi @splinter_code ] Do you want to start the RemoteRegistry service without Admin privileges? Just write into the "winreg" named pipe πŸ‘† πŸ₯ [ tweet ]
😈 [ Geiseric @Geiseric4 ]

Following @splinter_code idea, you can also start RemoteRegistry remotely. This way you can check on which server DAs are connected, in case you want dump their creds. This script could help:
It works from low privileged user πŸ˜‰

πŸ”— https://gist.github.com/GeisericII/6849bc86620c7a764d88502df5187bd0

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ Thomas Seigneuret @_zblurx ]

New feature in #NetExec : S4U2Self and S4U2Proxy support and automation with --delegate and --self

It allows you to abuse KCD with protocol transition and RBCD automatically in NetExec, and use directly all the postex functionalities πŸ”₯

For example with RBCD πŸ‘†πŸ»

πŸ₯ [ tweet ]
πŸ”₯8πŸ‘1
😈 [ Grzegorz Tworek @0gtweet ]

By-design AV bypass with "dev drive" πŸ˜…
I really like this feature!
Update your detection rules if you want to spot this...

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Antonio Cocomazzi @splinter_code ]

The slides of our joint research talk β€œ10 Years of Windows Privilege Escalation with Potatoes” at #POC2023 are out!

cc @decoder_it

πŸ”— https://github.com/antonioCoco/infosec-talks/blob/main/10_years_of_Windows_Privilege_Escalation_with_Potatoes.pdf

πŸ₯ [ tweet ]
πŸ”₯7
😈 [ ΡƒΟ…Ξ·g ՏΝА΀ @yunginnanet ]

this was meant to be a simple debugging tool, but ended up being a full barebones, concurrent RFC1928 (SOCKS5) server. unnecessarily fast, very simple.

gophers that are interested in learning SOCKS5 protocol may find this useful (hopefully someone does)

πŸ”— https://gist.github.com/yunginnanet/c84f831a4ac39eada5609ce0319f8d54

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ 5pider @C5pider ]

LdrLibraryEx.
A small x64 library to load PEs into memory.

πŸ”— https://github.com/Cracked5pider/LdrLibraryEx

πŸ₯ [ tweet ]
πŸ”₯3
😈 [ Charlie Clark @exploitph ]

Finally updated my RitM tool with the DES TGT session roasting code if anyone is interested.

Reminder, this isn't intended to be attack-ready code!

The attack is described in detail in my DES post (currently pinned to my profile).

πŸ”— https://github.com/0xe7/RoastInTheMiddle/pull/1

πŸ₯ [ tweet ]

спасибо @Michaelzhm, Ρ‡Ρ‚ΠΎ ΠΏΠ½ΡƒΠ» πŸ˜…
πŸ”₯4πŸ‘1😁1
😈 [ S4ntiagoP @s4ntiago_p ]

πŸ”₯ New blogpost πŸ”₯
Running PEs inline without a console.
You now can, for example, run PowerShell in CobaltStrike and obtain its output without spawning any process (including conhost.exe)

πŸ”— https://www.coresecurity.com/core-labs/articles/running-pes-inline-without-console

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ S3cur3Th1sSh1t @ShitSecure ]

Today I needed to decrypt Veeam stored credentials. As existing toolings failed and/or manual decryption for a lot of passwords was too much effort I wrote a small assembly to do the whole job:

πŸ”— https://github.com/S3cur3Th1sSh1t/SharpVeeamDecryptor

πŸ₯ [ tweet ]
πŸ‘3πŸ”₯1
😈 [ Rémi GASCOU (Podalirius) @podalirius_ ]

In my latest article, discover the depth of the msDS-KeyCredentialLink attribute used in ShadowCredentials attacks and how to parse it. Plus, discover a Python library, pydsinternals, that simplifies the parsing process.

Check it out ‡️

πŸ”— https://podalirius.net/en/articles/parsing-the-msds-keycredentiallink-value-for-shadowcredentials-attack/

πŸ₯ [ tweet ]
πŸ‘2