Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ William Burgess @joehowwolf ]

New CS blog: Introducing the Mutator Kit - Creating Object File Monstrosities with Sleep Mask and LLVM

πŸ”— https://www.cobaltstrike.com/blog/introducing-the-mutator-kit-creating-object-file-monstrosities-with-sleep-mask-and-llvm

πŸ₯ [ tweet ]
😈 [ FalconForce Official @falconforceteam ]

We are thrilled to publish SOAPHound: a custom-developed data collector tool to enumerate Active Directory environments via the ADWS-protocol. Enjoy!

πŸ”— https://falconforce.nl/soaphound-tool-to-collect-active-directory-data-via-adws/
πŸ”— https://github.com/FalconForceTeam/SOAPHound

πŸ₯ [ tweet ]
πŸ”₯4
😈 [ 5pider @C5pider ]

Modern implant design: position independent malware development.

A small blog post on how to design "modern" malware with features like global variables, raw strings, and compile-time hashing.

πŸ”— https://5pider.net/blog/2024/01/27/modern-shellcode-implant-design
πŸ”— https://github.com/Cracked5pider/Stardust

πŸ₯ [ tweet ]
πŸ‘5
😈 [ Rasta Mouse @_RastaMouse ]

Demo version of CsWhispers is now public. Any and all feedback is welcome.

πŸ”— https://github.com/rasta-mouse/CsWhispers

πŸ₯ [ tweet ]
πŸ”₯1
😈 [ Rasta Mouse @_RastaMouse ]

[BLOG]
Very short post containing some guidance on how to deal with ANYSIZE_ARRAY structures in C#.

πŸ”— https://rastamouse.me/anysize-array-csharp/

πŸ₯ [ tweet ]
πŸ‘2
😈 [ LuemmelSec @theluemmel ]

New blog by @itm4n is a must read for blue and red alike:

πŸ”— https://itm4n.github.io/printnightmare-exploitation/

Quality stuff as always. Thanks

I updated my Client-Checker to evaluate the affected reg keys so you can quickly check on your own if you might be affected or not:

πŸ”— https://github.com/LuemmelSec/Client-Checker

πŸ₯ [ tweet ]
πŸ”₯6
😈 [ John Lambert @JohnLaTwC ]

Midnight Blizzard: Guidance for responders on nation-state attack

πŸ”— https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/

πŸ₯ [ tweet ]

ΠΎΡ… ΡƒΠΆ эти русскиС Π°ΠΏΡ‚ΡˆΠ½ΠΈΠΊΠΈ, Π·Π½Π°Π΅Ρ‚Π΅ Π»ΠΈ
😁6
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯10
😈 [ Aurélien Chalot @Defte_ ]

It's finally out: from a Windows driver to a fully functionnal driver. In this blogpost we'll go through the history of EDR's, how they used to work, how they work now and how we can build a fully functionnal one. Last step is a chall, bypass MyDumbEDR

πŸ”— https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Slowerzs @slowerzs ]

I recently released ThievingFox, a collection of post-exploitation tools to gather credentials from various password managers and Windows utilities.

You can find my blogpost about it:

πŸ”— https://blog.slowerzs.net/posts/thievingfox/

And the Github repo of the tool:

πŸ”— https://github.com/Slowerzs/ThievingFox/

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ stacksmashing @ghidraninja ]

Lenovo X1 Carbon Bitlocker Key Sniffing any% Speedrun

(42.9 seconds)

Breaking Bitlocker: Bypassing the Windows Disk Encryption - using less than $10 of equipment:

πŸ”— https://youtu.be/wTl4vEednkQ

πŸ₯ [ tweet ]

расскаТитС этому ΠΏΠ°Ρ€Π½ΡŽ ΠΏΡ€ΠΎ Π°ΠΊΠΊΡƒΠΌΡƒΠ»ΡΡ‚ΠΎΡ€Π½ΡƒΡŽ ΠΎΡ‚Π²Π΅Ρ€Ρ‚ΠΊΡƒ
😁13πŸ‘4πŸ€”1
😈 [ Rasta Mouse @_RastaMouse ]

[BLOG]
I ported @0gtweet's token theft code to C#.

πŸ”— https://offensivedefence.co.uk/posts/nt-token-theft/

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Antonio 's4tan' Parata @s4tan ]

I wrote a new post: "Exploiting a vulnerable Minifilter Driver to create a process killer" source code: #malware #byovd

πŸ”— https://antonioparata.blogspot.com/2024/02/exploiting-vulnerable-minifilter-driver.html
πŸ”— https://github.com/enkomio/s4killer

πŸ₯ [ tweet ]
πŸ‘3πŸ₯±2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Cody Thomas @its_a_feature_ ]

Have you used a web shell on an offensive assessment recently? Were you able to task and create it through your C2 framework? I'm excited to announce the new Arachne agent for Mythic that allows you to do just that! Check it out

πŸ”— https://posts.specterops.io/spinning-webs-unveiling-arachne-for-web-shell-c2-26c40f570ea1

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Steve S. @0xTriboulet ]

Diago's writeup on Thread Pool manipulations is exactly what you need to read before your next Pool Party

πŸ”— https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools

πŸ₯ [ tweet ]
🀯4
😈 [ James Forshaw @tiraniddo ]

I try an avoid this hellsite, but I did a quick dive into sudo in Windows and here are my initial findings.

The main take away is, writing Rust won't save you from logical bugs :)

πŸ”— https://www.tiraniddo.dev/2024/02/sudo-on-windows-quick-rundown.html

πŸ₯ [ tweet ]

ΠΏΡ€ΠΎ Π½ΠΎΠ²Ρ‹ΠΉ sudo Π² win 11
πŸ”₯8
😈 [ WithSecureβ„’ @WithSecure ]

Threat actors often sign malware using either stolen, or even legally acquired, code signing certificates.

Check out the latest @Github update from @WithSecure's @dottor_morte, with a repository of certs known to have been leaked/stolen, and then abused.

πŸ”— https://github.com/WithSecureLabs/lolcerts

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Soumyani1 @reveng007 ]

I wanna thank all of them (Not In Order):
@SEKTOR7net
@VirtualAllocEx
@peterwintrsmith
@D1rkMtr
@Jean_Maes_1994
@0xBoku
@Sh0ckFR
@_winterknife_
@jack_halon

For helping me develop this POC, DarkWidow:

πŸ”— https://github.com/reveng007/DarkWidow

πŸ₯ [ tweet ]
πŸ‘8πŸ”₯5
Red Team Roadmap (by @soheilsec)

πŸ”— https://xmind.app/m/9Zcnkq

ΠŸΠΈΡˆΠΈΡ‚Π΅, ΠΊΠ°ΠΊΠΈΡ… ΡƒΡ€ΠΎΠ²Π½Π΅ΠΉ Π²Π°ΠΌ Π½Π΅ Ρ…Π²Π°Ρ‚Π°Π΅Ρ‚ πŸ‘‡
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ₯±7πŸ‘6πŸ”₯1
😈 [ MDSec @MDSecLabs ]

Interested in sharpening your red team AD recon? Check out our latest post by @domchell, "Active Directory Enumeration for Red Teams"

πŸ”— https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘2
😈 [ Andy Robbins @_wald0 ]

Directory.ReadWrite.All is not as powerful as you might think. In this post:

● Why that matters
● How I came to that conclusion
● Which app roles matter more

πŸ”— https://posts.specterops.io/directory-readwrite-all-is-not-as-powerful-as-you-might-think-c5b09a8f78a8

πŸ₯ [ tweet ]
πŸ‘6