Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ TrustedSec, TrustedSec ]

Don't suffer a LAPS(e) in judgement! Your tools need protection too. Security Consultant @mega_spl0it outlines how to build #Splunk SPL queries to detect attacks against #MicrosoftLAPS in our new #blog. https://t.co/nhcuC6eZx4

πŸ”— https://hubs.la/Q01xvpTt0

πŸ₯ [ tweet ]
😈 [ TrustedSec, TrustedSec ]

In our newest #blog post, TAC Practice Lead @4ndr3w6S and co-author @exploitph lead us through the examination of #Kerberos ticket times and #checksums to demonstrate their importance and how they can better serve both offensive and defensive operators. https://t.co/kGgsXB0VUO

πŸ”— https://hubs.la/Q01GMZBS0

πŸ₯ [ tweet ]
😈 [ TrustedSec @TrustedSec ]

Our new #blog post by @mega_spl0it and @4ndr3W6S takes a deep dive into how Active Directory (AD) attribute-based detections can be built and how to identify where an adversary may be hiding. Read the first of this 3-part series now!

πŸ”— https://hubs.la/Q024-06m0

πŸ₯ [ tweet ]
πŸ‘4
Offensive Twitter
😈 [ TrustedSec @TrustedSec ] In Part 2 of our new #blog series by @mega_spl0it and @4ndr3W6S, they build detections for additional attributes, this time focusing on those that can be modified using the #PowerMad tool. Read it now! πŸ”— https://hubs.ly/Q025hFdr0…
😈 [ TrustedSec @TrustedSec ]

In the third and final installment of our #blog series by @mega_spl0it @4ndr3W6S DACL-based detections are built, identifying attacks that focus on obscure or lesser-known AD Attributes that fall outside of the scope of Parts 1 and 2. Read it now!

πŸ”— https://hubs.la/Q025N0lk0

πŸ₯ [ tweet ]
πŸ”₯4πŸ‘1
😈 [ TrustedSec @TrustedSec ]

In our new #blog post, Senior Security Consultant @n00py1 shows us why you don't need a drawer full of fancy tools to pivot through networksβ€”just some Windows #OpenSSH magic. Read it now!

πŸ”— https://hubs.ly/Q02b_c620

πŸ₯ [ tweet ]
πŸ‘5πŸ”₯1
😈 [ TrustedSec @TrustedSec ]

It’s time to get Groovy! In our new #blog, @__mez0__ goes over a variety of post-exploitation tasks in the #Groovy programming language for the next time you’re #enumerating a network. Read it now!

πŸ”— https://hubs.la/Q02Vhm2G0

πŸ₯ [ tweet ]
πŸ‘3
😈 [ TrustedSec @TrustedSec ]

In our new #blog, Senior Research Analyst @codewhisperer84 unveils his new tool DIT Explorer which he created after researching NTDS.dit files on Active Directory. Read part one of this series now to find out what this tool can do!

πŸ”— https://trustedsec.com/blog/exploring-ntds-dit-part-1-cracking-the-surface-with-dit-explorer

πŸ₯ [ tweet ]
πŸ‘3πŸ₯±3