Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip 🛠] Some tips and links on how NTDS reversible encryption usage (means you can DCSync cleartext passwords) can be enumerated during an AD security assessment:

🔗 https://t.co/pjUzcqzxYK
🔗 https://t.co/km8ZhkrJrt

#ntds #ad #adsecurity

🔗 https://adsecurity.org/?p=2053
🔗 https://www.blackhillsinfosec.com/how-i-cracked-a-128-bit-password/

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ] When there’s not much info revealed about AD sites from CME subnets module, we can combine @_dirkjan’s adidnsdump with @pdiscoveryio mapcidr to get a nicely formatted list of the target intranetworks 🕸

#ad #dns

🐥 [ tweet ]
🔥1
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ] Such a tiny code snippet that can help you bypass some automatic sandbox detections

#maldev

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ] Looking for a legitimate way of achieving #persistence on Windows? How about #AnyDesk silent deployment? 😉

🐥 [ tweet ]
🔥2
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ] While guys @_EthicalChaos_ and @an0n_r0 are talking about a legitimate way of jumping into RDP via smart card auth having a certificate, I’ll give a more clumsy approach: UnPAC-the-Hash (PKINIT) DisableRestrictedAdmin=0 scforceoption=0 xfreerdp /pth 🎉

🐥 [ tweet ]
🔥1
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ⚒️] A simple post-exploitation tip when you’ve added a GitLab admin from a compomised gitlab-rails console: if there’s only LDAP auth available and you cannot sign in even when you possess valid creds, do this to enable password auth for web 🤓

https://t.co/uJCcbhQZNz

🔗 https://ppn.snovvcrash.rocks/pentest/infrastructure/devops/gitlab#gitlab-rails

🐥 [ tweet ]
🔥2
👹 [ snovvcrash, sn🥶vvcr💥sh ]

[#HackTip ⚒️] One idea for NTDS on-site dumping without VSS: NTFSCopy (thx @RedCursorSec) + #impacket’s RemoteOperations.getBootKey() + secretsdump[.]py (e.g., via a pre-compiled binary or @naksyn’s awesome Pyramid) 🤪

https://t.co/0UATJuJ1ob

🔗 https://ppn.snovvcrash.rocks/pentest/infrastructure/ad/credentials-dump/ntds#raw-ntds.dit-copy

🐥 [ tweet ][ quote ]