Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯10
😈 [ Aurélien Chalot @Defte_ ]

It's finally out: from a Windows driver to a fully functionnal driver. In this blogpost we'll go through the history of EDR's, how they used to work, how they work now and how we can build a fully functionnal one. Last step is a chall, bypass MyDumbEDR

πŸ”— https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Slowerzs @slowerzs ]

I recently released ThievingFox, a collection of post-exploitation tools to gather credentials from various password managers and Windows utilities.

You can find my blogpost about it:

πŸ”— https://blog.slowerzs.net/posts/thievingfox/

And the Github repo of the tool:

πŸ”— https://github.com/Slowerzs/ThievingFox/

πŸ₯ [ tweet ]
πŸ‘2πŸ”₯2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ stacksmashing @ghidraninja ]

Lenovo X1 Carbon Bitlocker Key Sniffing any% Speedrun

(42.9 seconds)

Breaking Bitlocker: Bypassing the Windows Disk Encryption - using less than $10 of equipment:

πŸ”— https://youtu.be/wTl4vEednkQ

πŸ₯ [ tweet ]

расскаТитС этому ΠΏΠ°Ρ€Π½ΡŽ ΠΏΡ€ΠΎ Π°ΠΊΠΊΡƒΠΌΡƒΠ»ΡΡ‚ΠΎΡ€Π½ΡƒΡŽ ΠΎΡ‚Π²Π΅Ρ€Ρ‚ΠΊΡƒ
😁13πŸ‘4πŸ€”1
😈 [ Rasta Mouse @_RastaMouse ]

[BLOG]
I ported @0gtweet's token theft code to C#.

πŸ”— https://offensivedefence.co.uk/posts/nt-token-theft/

πŸ₯ [ tweet ]
πŸ‘3
😈 [ Antonio 's4tan' Parata @s4tan ]

I wrote a new post: "Exploiting a vulnerable Minifilter Driver to create a process killer" source code: #malware #byovd

πŸ”— https://antonioparata.blogspot.com/2024/02/exploiting-vulnerable-minifilter-driver.html
πŸ”— https://github.com/enkomio/s4killer

πŸ₯ [ tweet ]
πŸ‘3πŸ₯±2
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ Cody Thomas @its_a_feature_ ]

Have you used a web shell on an offensive assessment recently? Were you able to task and create it through your C2 framework? I'm excited to announce the new Arachne agent for Mythic that allows you to do just that! Check it out

πŸ”— https://posts.specterops.io/spinning-webs-unveiling-arachne-for-web-shell-c2-26c40f570ea1

πŸ₯ [ tweet ]
πŸ”₯5
😈 [ Steve S. @0xTriboulet ]

Diago's writeup on Thread Pool manipulations is exactly what you need to read before your next Pool Party

πŸ”— https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools

πŸ₯ [ tweet ]
🀯4
😈 [ James Forshaw @tiraniddo ]

I try an avoid this hellsite, but I did a quick dive into sudo in Windows and here are my initial findings.

The main take away is, writing Rust won't save you from logical bugs :)

πŸ”— https://www.tiraniddo.dev/2024/02/sudo-on-windows-quick-rundown.html

πŸ₯ [ tweet ]

ΠΏΡ€ΠΎ Π½ΠΎΠ²Ρ‹ΠΉ sudo Π² win 11
πŸ”₯8
😈 [ WithSecureβ„’ @WithSecure ]

Threat actors often sign malware using either stolen, or even legally acquired, code signing certificates.

Check out the latest @Github update from @WithSecure's @dottor_morte, with a repository of certs known to have been leaked/stolen, and then abused.

πŸ”— https://github.com/WithSecureLabs/lolcerts

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ Soumyani1 @reveng007 ]

I wanna thank all of them (Not In Order):
@SEKTOR7net
@VirtualAllocEx
@peterwintrsmith
@D1rkMtr
@Jean_Maes_1994
@0xBoku
@Sh0ckFR
@_winterknife_
@jack_halon

For helping me develop this POC, DarkWidow:

πŸ”— https://github.com/reveng007/DarkWidow

πŸ₯ [ tweet ]
πŸ‘8πŸ”₯5
Red Team Roadmap (by @soheilsec)

πŸ”— https://xmind.app/m/9Zcnkq

ΠŸΠΈΡˆΠΈΡ‚Π΅, ΠΊΠ°ΠΊΠΈΡ… ΡƒΡ€ΠΎΠ²Π½Π΅ΠΉ Π²Π°ΠΌ Π½Π΅ Ρ…Π²Π°Ρ‚Π°Π΅Ρ‚ πŸ‘‡
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ₯±7πŸ‘6πŸ”₯1
😈 [ MDSec @MDSecLabs ]

Interested in sharpening your red team AD recon? Check out our latest post by @domchell, "Active Directory Enumeration for Red Teams"

πŸ”— https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/

πŸ₯ [ tweet ]
πŸ”₯6πŸ‘2
😈 [ Andy Robbins @_wald0 ]

Directory.ReadWrite.All is not as powerful as you might think. In this post:

● Why that matters
● How I came to that conclusion
● Which app roles matter more

πŸ”— https://posts.specterops.io/directory-readwrite-all-is-not-as-powerful-as-you-might-think-c5b09a8f78a8

πŸ₯ [ tweet ]
πŸ‘6
😈 [ V❄️ @vincenzosantuc1 ]

Blog post about how I granted the Reflective DLL I worked on with Indirect Syscall skills. PIC to enumerate SSN and few Windows calling convention theory "pills". Among the other challenges :)

πŸ”— https://oldboy21.github.io/posts/2024/02/reflective-dll-got-indirect-syscall-skills/

πŸ₯ [ tweet ]
πŸ‘7
😈 [ Soufiane @S0ufi4n3 ]

New technique to bypassing EDRs with EDR-Preloading.

Tldr: blocking EDR from loading it's DLL into a process preventing the deployment of user land hooks.

πŸ”— https://malwaretech.com/2024/02/bypassing-edrs-with-edr-preload.html
πŸ”— https://github.com/MalwareTech/EDR-Preloader

πŸ₯ [ tweet ]
πŸ”₯7πŸ‘1
😈 [ WHOAMI @wh0amitz ]

SharpADWS implements MS-ADDM, MS-WSTIM and MS-WSDS protocol, you can use the source code of it to easily implement the following operations on Active Directory Web Services:

Enumerate
Pull
Delete
Get
Put
Add
Replace
Delete
Create

πŸ”— https://github.com/wh0amitz/SharpADWS

πŸ₯ [ tweet ]
πŸ”₯5πŸ‘4
😈 [ SpecterOps @SpecterOps ]

Check out our latest blog post about ADCS ESC13. @Jonas_B_K discusses how the abuse technique works, the ADCS feature it abuses, where the feature is used in the wild, how we can audit for ESC13, and how to deal with it from a defensive perspective.

πŸ”— https://posts.specterops.io/adcs-esc13-abuse-technique-fda4272fbd53

πŸ₯ [ tweet ]

я запутався Π² этих эсках ΡƒΠΆΠ΅ πŸ˜’
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯4πŸ‘2😁1
😈 [ BlackArrow @BlackArrowSec ]

Enhanced version of secretsdump from #Impacket to dump credentials without touching disk.

This feature takes advantage of the WriteDACL privileges held by local administrators to provide temporary read permissions on registry hives.

πŸ”— https://github.com/fortra/impacket/pull/1698
πŸ”— https://github.com/jfjallid/go-secdump

πŸ₯ [ tweet ]
πŸ”₯7πŸ‘2
😈 [ icyguider @icyguider ]

I recently implemented 7 public UAC bypasses as BOFs and integrated them into a Havoc module and Sliver extensions. Requests to add more bypass methods are also welcome!

πŸ”— https://github.com/icyguider/UAC-BOF-Bonanza

πŸ₯ [ tweet ]
πŸ”₯8πŸ‘4
😈 [ Thorsten E. @endi24 ]

A PowerShell script to create an HTML report on recent changes in Active Directory.

πŸ”— https://gist.github.com/jdhitsolutions/9255f0bf7fe0dc6d2dde868c18d5049f

πŸ₯ [ tweet ]
πŸ‘5πŸ”₯2πŸ€”1