Offensive Xwitter
19.4K subscribers
909 photos
49 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
๐Ÿ˜ˆ [ SafeBreach @safebreach ]

Starting 2025 strong! Weโ€™ve developed a PoC exploit for CVE-2024-49112. Read the blog and check out the GitHub repo.

Blog:
๐Ÿ”— https://www.safebreach.com/blog/ldapnightmare-safebreach-labs-publishes-first-proof-of-concept-exploit-for-cve-2024-49112/

PoC:
๐Ÿ”— https://github.com/SafeBreach-Labs/CVE-2024-49112

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ9๐Ÿฅฑ4๐Ÿ‘3๐Ÿคฏ2
๐Ÿ˜ˆ [ Dirk-jan @_dirkjan ]

Few BloodHound python updates: LDAP channel binding is now supported with Kerberos auth (native) or with NTLM (custom ldap3 version). Furthermore, the BH CE collector now has its own pypi package and command. You can have both on the same system with pipx.

๐Ÿ”— https://github.com/dirkjanm/BloodHound.py

๐Ÿฅ [ tweet ]

ั‚ะพะถะต ะฝะตะดะฐะฒะฝะพ ะพะฑะฝะพะฒะปัะป ั‡ะธั‚ัˆะธั‚ ะฟะพ ะฑั‹ัั‚ั€ะพะผัƒ ั€ะฐะทะฒะพั€ะฐั‡ะธะฒะฐะฝะธัŽ "ะฝะพะฒะพะณะพ" ะฑั…:

๐Ÿ”— https://ppn.snovvcrash.rocks/pentest/infrastructure/ad#setup
๐Ÿ”ฅ10๐Ÿ‘4
๐Ÿ˜ˆ [ Synacktiv @Synacktiv ]

You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream).
Here is an example with ldeep using relayed authentication from HTTP to LDAPs.

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ8๐Ÿ‘1
๐Ÿ˜ˆ [ t3l3machus @t3l3machus ]

New experimental tool for rapid extraction and analysis of Windows service configs and ACEs for potential PE candidates, removing the need for tools like accesschk.exe or other non-native binaries.

๐Ÿ”— https://github.com/t3l3machus/ACEshark

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ11
๐Ÿ˜ˆ [ CICADA8Research @CICADA8Research ]

SpyWare 2.0 ๐Ÿ”


Read our new research and learn about MS UIA technology. You will explore the depths of COM, graphical elements in Windows and spy on WhatsApp, Telegram, Slack, and Keepass ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ’ป

Blog:
๐Ÿ”— https://cicada-8.medium.com/im-watching-you-how-to-spy-windows-users-via-ms-uia-c9acd30f94c4

Tool:
๐Ÿ”— https://github.com/CICADA8-Research/Spyndicapped

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ9๐Ÿ‘6๐ŸŽ„3๐Ÿคฏ2
๐Ÿ˜ˆ [ mpgn @mpgn_x64 ]

So you want to exploit ADCS ESC8 with only netexec and ntlmrelayx ? Fear not my friend, I will show you how to do it ๐Ÿ‘†

NetExec now supports "Pass-the-Cert" as an authentication method, thanks to @_dirkjan original work on PKINITtools โ›ฑ๏ธ

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ7๐Ÿ‘2
๐Ÿ˜ˆ [ Adam Chester ๐Ÿดโ€โ˜ ๏ธ @_xpn_ ]

Achievement unlocked, my first blog with SoecterOps ๐Ÿค— This post looks at ADFS OAuth2 support, Device Registration, Enterprise PRT, and a brain dump of things that I didnโ€™t want to leave sat on Notion.

๐Ÿ”— https://posts.specterops.io/adfs-living-in-the-legacy-of-drs-c11f9b371811

๐Ÿฅ [ tweet ]
๐Ÿ‘6
๐Ÿ˜ˆ [ Orange Tsai ๐ŸŠ @orange_8361 ]

The detailed version of our #WorstFit attack is available now! ๐Ÿ”ฅ

Check it out! ๐Ÿ‘‡

๐Ÿ”— https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ”ฅ6๐Ÿ‘3
๐Ÿ˜ˆ [ Nithin Chenthur Prabhu @Azr43lKn1ght ]

Introducing Rusty-PE-Packer: a sophisticated Windows PE packer written in Rust, featuring progressive masked RC4 encryption, VEH exploitation for ROP gadget execution via RIP manipulation, and injection into legitimate Windows processes.

๐Ÿ”— https://github.com/Azr43lKn1ght/Rusty-PE-Packer

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ12
๐Ÿ˜ˆ [ Bnb @HulkOperator ]

Recently, Iโ€™ve been experimenting with Return Address Spoofing and developed a tool to call any WinAPI and spoof the return address.

For a deeper dive, check out my blog post:

๐Ÿ”— https://hulkops.gitbook.io/blog/red-team/x64-return-address-spoofing

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ7๐Ÿ‘4
๐Ÿ˜ˆ [ mpgn @mpgn_x64 ]

imo way to complicated to extract the ntds, once you got a user with backup privilege group just do:
nxc smb dc -u user -p pass -M backup_operator

๐Ÿ†

๐Ÿฅ [ tweet ][ quote ]
๐Ÿ‘16๐Ÿ”ฅ1๐ŸŒ1
๐Ÿ˜ˆ [ Matt Ehrnschwender @M_alphaaa ]

Keeping the blog alive. For people who may be unaware, you can embed a file in a C/C++ program without needing to make a giant byte array in a header file for it. Kind of went a little bit overboard on the detail with this lol but it's pretty useful

๐Ÿ”— https://blog.cybershenanigans.space/posts/embedding-files-in-c-cpp-programs/

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ7
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜ˆ [ MrAle98 @MrAle_98 ]

Finally finished to develop an exploit for CVE-2024-49138: vulnerability in CLFS.sys.

I'll provide a detailed analysis in a blog post.

๐Ÿ”— https://github.com/MrAle98/CVE-2024-49138-POC

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ12๐Ÿ‘1
๐Ÿ˜ˆ [ Synacktiv @Synacktiv ]

A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00.

๐Ÿ”— https://www.synacktiv.com/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ5๐Ÿ‘1
๐Ÿ˜ˆ [ Cellebrite Labs @CellebriteLabs ]

We just released our lightweight IDA syncing solution, LabSync, on GitHub! ๐ŸŽ‰ LabSync uses YAML files in a git repo to sync your IDB with other researchers whenever you save it. Check it out:

๐Ÿ”— https://github.com/cellebrite-labs/LabSync

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ4
๐Ÿ˜ˆ [ Rad @rad9800 ]

For those unable to get their hands on EDR software for reversing, TrendMicro kindly publishes their resources at:

๐Ÿ”— https://help.deepsecurity.trendmicro.com/software.html

It's possible to download and extract the on-prem appliance and explore to understand how EDRs (if you can even call it that) work.

๐Ÿฅ [ tweet ]
๐Ÿ‘4
๐Ÿ˜ˆ [ Josh @passthehashbrwn ]

New blog from me on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that I identified in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.

๐Ÿ”— https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/

๐Ÿฅ [ tweet ]
๐Ÿ‘8๐Ÿ”ฅ3
๐Ÿ˜ˆ [ Grzegorz Tworek @0gtweet ]

Wait, what? ๐Ÿ˜ฎ

And to be precise, it affects the GetComputernameW itself, and not just one tool using it.

๐Ÿฅ [ tweet ]
๐Ÿค”9
Forwarded from APT
๐Ÿ” Exploring WinRM plugins for lateral movement

In this blog, the process of leveraging WinRM plugins to perform lateral movement to other systems is explored. Additionally, the use of the CIM_LogicFile WMI class to bypass certain tricky detections by Microsoft Defender is examined. Finally, all the logic is incorporated into a Cobalt Strike BOF.

๐Ÿ”— Research:
https://falconforce.nl/exploring-winrm-plugins-for-lateral-movement/

๐Ÿ”— Source:
https://github.com/FalconForceTeam/bof-winrm-plugin-jump

#ad #winrm #cobaltstrike #bof #redteam
๐Ÿ‘7๐Ÿ”ฅ2
๐Ÿ˜ˆ [ ssno @ssnossnossno ]

I spent the last month reverse engineering Call of Duty's anti-cheat!

Blog post here:
๐Ÿ”— https://ssno.cc/posts/reversing-tac-1-4-2025/

Code:
๐Ÿ”— https://github.com/ssnob/hidden_syscall_monitoring

๐Ÿฅ [ tweet ]
๐Ÿ”ฅ4๐Ÿ‘3