Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ Tyl0us, Matt Eidelberg ]

New Tool - Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods. Check it out: https://t.co/hjB7aXqVhy
#netsec #redteam #EDR #evasion

🔗 https://github.com/optiv/Freeze

🐥 [ tweet ]
😈 [ SemperisTech, Semperis ]

New research from Semperis' Charlie Clark (@exploitph) describes a vulnerability that could open new attack paths, detection bypasses, and potential weakening of security controls, putting orgs at higher risk from #Kerberoasting and other attacks. 👇

https://t.co/Z3dqq3i8EJ

🔗 https://www.semperis.com/blog/new-attack-paths-as-requested-sts

🐥 [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]

The difference between signature-based and behavioural detections. As well as a little philosophy. 😎
https://t.co/pmtqDdV1xx

🔗 https://s3cur3th1ssh1t.github.io/Signature_vs_Behaviour/

🐥 [ tweet ]
😈 [ _nwodtuhs, Charlie “Shutdown” ]

Wrapping things up and pushing a pull request on Impacket, followed by https://t.co/h6yAdPK5NM guidance on the matter
- Kerberoast trough AS-REQ w/o pre-auth
- Service ticket request through AS-REQ
Again, great work by @exploitph

🔗 http://thehacker.recipes

🐥 [ tweet ][ quote ]
🔥2
😈 [ carlospolopm, carlospolop ]

HackTricks Cloud (or CloudTrick) is finally public:
- https://t.co/VwgVsUKo3x
- https://t.co/kZ9XlHAsJR

Thank you again to all the supporters!
#hacktricks #cloud

🔗 https://cloud.hacktricks.xyz/
🔗 https://github.com/carlospolop/hacktricks-cloud

🐥 [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

DumpThatLSASS. Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk
https://t.co/wKgBmr5CR6

🔗 https://github.com/D1rkMtr/DumpThatLSASS

🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ aniqfakhrul, Aniq Fakhrul ]

Simple POC on exfiltrating using google translate. Also resolution is 💩, my bad.

🐥 [ tweet ]
🔥3
😈 [ cnotin, Clément Notin ]

Have you ever wondered how to decrypt “encrypted stub data” 🔐 fields in Wireshark when analyzing Kerberos, RPC, LDAP... traffic?
➡️ Ask no more!
https://t.co/dkjidQt6Fv
1. get Kerberos keys
2. give keys to Wireshark in a keytab file
3. get decrypted RPC!
Works with NTLM too 😉

🔗 https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ cube0x0, Cube0x0 ]

How do you work in security without having to talk?

🐥 [ tweet ]

хакеров-интровертов тред
😈 [ cube0x0, Cube0x0 ]

🐥 [ tweet ]
😈 [ NotMedic, Tim McGuffin ]

I don't know what to do with this knowledge, but today I learned that curl has a handler for LDAP URIs.

curl --user $CREDS "ldaps://ldap.foo.com/DC=ads,DC=foo,DC=com?memberOf?sub?(&(sAMAccountName=$USER)(memberOf=CN=$GROUP,OU=Distribution,OU=Groups,DC=ads,DC=foo,DC=com))"

🐥 [ tweet ]
😈 [ C5pider, 5pider ]

The Havoc Framework
https://t.co/eBpOaicsI6

🔗 https://github.com/HavocFramework/Havoc

🐥 [ tweet ]

так, дождались сорцов
🔥3