Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ฅ14๐Ÿคฏ2
๐Ÿ˜ˆ [ Dominic Chell ๐Ÿ‘ป @domchell ]

๐Ÿ™ˆ๐Ÿ™ˆ๐Ÿ™ˆ

๐Ÿฅ [ tweet ]

ะฐะณะฐ, ั‚ะพะถะต ะฑั‹ะปะพ ั‚ะฐะบะพะต
๐Ÿ˜6๐ŸŒ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ chebuya @_chebuya ]

How I discovered and exploited an unauthenticated SSRF in the Havoc C2 teamserver, allowing attackers to leak origin IPs of teamservers behind redirectors and much more!

๐Ÿ”— https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
๐Ÿ”— https://github.com/chebuya/Havoc-C2-SSRF-poc

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ6
๐Ÿ˜ˆ [ CICADA8Research @CICADA8Research ]

Process Injection is Dead. Long Live IHxHelpPaneServer

How can a user's session be abused without process injection, remotekrbrelay, tgsthief?

Read it in our new article:
๐Ÿ”— https://cicada-8.medium.com/process-injection-is-dead-long-live-ihxhelppaneserver-af8f20431b5d

POC:
๐Ÿ”— https://github.com/CICADA8-Research/IHxExec

๐Ÿฅ [ tweet ]
๐Ÿ‘9๐Ÿ”ฅ6
๐Ÿ˜ˆ [ Greg Darwin @gregdarwin ]

After months in development, Cobalt Strike 4.10 is now available for download. This release sees the introduction of BeaconGate, the Sleepmask-VS, postex kit, a new job browser and much, much more. Check out the blog post for details:

๐Ÿ”— https://www.cobaltstrike.com/blog/cobalt-strike-410-through-the-beacongate

๐Ÿฅ [ tweet ]

ะฝะพะฒะฐั ะฑะธะฑะฐ ัั€ะฐะบ, ะบะฐะบ ะณะพะฒะพั€ะธั‚ @Acrono
๐Ÿ˜7๐Ÿ”ฅ1
๐Ÿ˜ˆ [ Antonio Cocomazzi @splinter_code ]

Excited to share my latest research about FIN7 ๐Ÿ”ฅ
The discovery of a new abuse for the Windows built-in driver ProcLaunchMon.sys (TTD Monitor driver) to tamper with EDRs has been an interesting surprise.
Enjoy the read ๐Ÿ‘‡

๐Ÿ”— https://www.sentinelone.com/labs/fin7-reboot-cybercrime-gang-enhances-ops-with-new-edr-bypasses-and-automated-attacks/

๐Ÿฅ [ tweet ]
๐Ÿ‘5
๐Ÿ˜ˆ [ Duncan Ogilvie ๐Ÿ @mrexodia ]

๐Ÿšจ Want to quickly find the ntdll base without checking the module name? ๐Ÿšจ You can use the location of the LoaderLock to know which range is the right one.

๐Ÿฅ [ tweet ]
๐Ÿ‘6
๐Ÿ˜22๐Ÿฅฑ4
๐Ÿ˜ˆ [ Zach Vorhies / Google Whistleblower @Perpetualmaniac ]

Crowdstrike Analysis:

It was a NULL pointer from the memory unsafe C++ language.

Since I am a professional C++ programmer, let me decode this stack trace dump for you.

๐Ÿ”— https://threadreaderapp.com/thread/1814376668095754753.html

๐Ÿฅ [ tweet ]

ะฟั€ะพั„ะตััะธะพะฝะฐะป ั†ะฟะฟ ะฟั€ะพะณั€ะฐะผะผะธัั‚ ะฒัะต ะพะฑัŠััะฝะธะป
๐Ÿ”ฅ11๐ŸŒ1
Offensive Xwitter
๐Ÿ˜ˆ [ Zach Vorhies / Google Whistleblower @Perpetualmaniac ] Crowdstrike Analysis: It was a NULL pointer from the memory unsafe C++ language. Since I am a professional C++ programmer, let me decode this stack trace dump for you. ๐Ÿ”— https://threadreaderapโ€ฆ
๐Ÿ˜ˆ [ Tavis Ormandy @taviso ]

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... ๐Ÿงต1/n

๐Ÿ”— https://threadreaderapp.com/thread/1814762302337654829.html

๐Ÿฅ [ tweet ]

(ะฒัะต ั€ะฐะฒะฝะพ ะฑะพะปัŒัˆะต ะฝะธั‡ะตะณะพ ะธะฝั‚ะตั€ะตัะฝะพะณะพ ะฝะต ะฟั€ะพะธัั…ะพะดะธั‚)
๐Ÿ‘6๐Ÿค”4๐Ÿ”ฅ3๐Ÿ˜1
๐Ÿ˜ˆ [ Max Harley @0xdab0 ]

Finally releasing a very beta version of my ADExplorerSnapshot Rust rewrite! There have been a ton of performance optimizations, edges added, and usability improvements since the quoted tweet. I'm really excited for people to start using and breaking it.

๐Ÿ”— https://github.com/t94j0/adexplorersnapshot-rs

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ‘7๐Ÿฅฑ3
๐Ÿ˜ˆ [ 5pider @C5pider ]

I haven't posted anything about Havoc in a while so imma share something I have been working on. Wrote a custom VM/Interpreter (based on the RISC-V instruction set) to execute exploits and other arbitrary code.
The client is now fully extendable and scriptable via the Python API

๐Ÿฅ [ tweet ]
๐Ÿ‘7
๐Ÿ˜ˆ [ Aurรฉlien Chalot @Defte_ ]

Super interesting way of blinding EDR's consoles!!

๐Ÿ”— https://tierzerosecurity.co.nz/2024/07/23/edr-telemetry-blocker.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ6๐Ÿ‘2
๐Ÿ˜ˆ [ Print3M @Print3M_ ]

I wrote my first calc.exe "shellcode" in NASM. I find it a little strange that a lot of people write about malware development but almost no one talks about writing your own shellcode. I decided to write something on my own. (good comments, easy readable)

๐Ÿ”— https://github.com/Print3M/shellcodes/blob/main/calc-exe.asm

๐Ÿฅ [ tweet ]

#ะดะปั_ัะฐะผั‹ั…_ะผะฐะปะตะฝัŒะบะธั…
๐Ÿ‘7๐Ÿ”ฅ1
๐Ÿ˜ˆ [ Alex Neff @al3x_n3ff ]

A new module just got merged into NetExec, which extracts the security Questions for local users ๐Ÿš€

Made by @Adamkadaban

If you want to know the details, you can read his blog post here:

๐Ÿ”— https://hackback.zip/2024/05/08/Remotely-Dumping-Windows-Security-Questions-With-Impacket.html

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ12๐Ÿ‘2
๐Ÿ˜ˆ [ Kaspersky @kaspersky ]

A zero-day vulnerability actively exploited by attackers has been discovered in Internet Explorer โ€” the browser that Microsoft supposedly laid to rest over a year ago.

Full story:
๐Ÿ”— https://www.kaspersky.com/blog/zero-day-in-internet-explorer/51698/

๐Ÿฅ [ tweet ]
๐Ÿ‘7๐Ÿ”ฅ3๐Ÿ˜3
๐Ÿ˜ˆ [ Check Point Research @_CPResearch_ ]

In this blog we introduce Thread-Name Calling - A new process injection technique using Thread Name. We also discuss various scenarios in which this not widely-known API can be used for offense.

Blog:
๐Ÿ”— https://research.checkpoint.com/2024/thread-name-calling-using-thread-name-for-offense/

PoC:
๐Ÿ”— https://github.com/hasherezade/thread_namecalling

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ4๐Ÿ‘1๐Ÿฅฑ1