Offensive Twitter
19.1K subscribers
888 photos
47 videos
21 files
2.05K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://t.iss.one/OffensiveTwitter/546
Download Telegram
😈 [ CoreAdvisories, CoreLabs Research ]

Get an in-depth analysis of recent #Windows #vulnerability, CVE-2022-22029> from cybersecurity expert and #exploit writer @ricnar456
https://t.co/i4nyYDiapH

πŸ”— https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-22029-windows-network-file-system-vulnerability

πŸ₯ [ tweet ]
😈 [ podalirius_, Podalirius ]

[#thread 🧡] This weekend I wrote a #tool to scan for @TheApacheTomcat server #vulnerabilities in networks. I've always dreamed to be able to retrieve the list of computers in a #Windows #domain and scan for vulnerable #Apache #Tomcats automatically! πŸŽ‰

https://t.co/EOWfTbFCRh

πŸ”— https://github.com/p0dalirius/ApacheTomcatScanner/

πŸ₯ [ tweet ]
😈 [ podalirius_, Podalirius ]

Today with my friend @_Worty we're releasing a technique to coerce an NTLM authentication on #Windows #SQL #Server as the machine account (in most cases). πŸ₯³

A step by step demonstration is here: https://t.co/woCDA1M0Zr

πŸ”— https://github.com/p0dalirius/MSSQL-Analysis-Coerce

πŸ₯ [ tweet ]
Forwarded from APT
⭐️ Privileger

Privilger allows you to work with privileges in Windows as easily as possible. There are three modes:

β€” Add privileges to an account;
β€” Start a process by adding a specific privilege to its token;
β€” Remove privilege from the user.

Thanks to:
@Michaelzhm

https://github.com/MzHmO/Privileger

#ad #windows #privilege #lsa
πŸ”₯2
😈 [ OtterHacker, OtterHacker ]

I published my Kerberos experiments. The code is here for educational use only. Do not use it for pentest as it is neither OPSEC nor stable and kinda messy.

But if you want to see how to play with #Kerberos with #Windows, it can be a starting point ! 😊

https://t.co/CPP2EfSKCb

πŸ”— https://github.com/OtterHacker/Cerbere

πŸ₯ [ tweet ]
πŸ”₯2
😈 [ r1cksec, r1cksec ]

New cheatsheets pushed πŸ•΅οΈβ€β™‚οΈ

πŸ”— https://github.com/r1cksec/cheatsheets

Including:

A well written blog post on how to read and parse LSASS memory dumps with PowerShell πŸ”

#infosec #cybersecurity #pentesting #redteam #lsass #windows

πŸ”— https://powerseb.github.io/posts/LSASS-parsing-without-a-cat

πŸ₯ [ tweet ]
πŸ‘4
😈 [ HADESS @Hadess_security ]

The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals.

Article:
πŸ”— https://hadess.io/the-art-of-hiding-in-windows/

EBook:
πŸ”— https://hadess.io/the-art-of-hiding-in-windows-ebook/

#windows #redteam

πŸ₯ [ tweet ]

(pdf-ΠΊΠ° Π² ΠΊΠΎΠΌΠΌΠ΅Π½Ρ‚Π°Ρ…)
πŸ‘2πŸ”₯2
😈 [ NCV @nickvourd ]

Proudly Announcing Windows Local Privilege Escalation Cookbook
#pentest #redteam #windows #privesc

πŸ”— https://github.com/nickvourd/Windows-Local-Privilege-Escalation-Cookbook

πŸ₯ [ tweet ]
πŸ”₯4