Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ cnotin, Clément Notin ]

Have you ever wondered how to decrypt “encrypted stub data” 🔐 fields in Wireshark when analyzing Kerberos, RPC, LDAP... traffic?
➡️ Ask no more!
https://t.co/dkjidQt6Fv
1. get Kerberos keys
2. give keys to Wireshark in a keytab file
3. get decrypted RPC!
Works with NTLM too 😉

🔗 https://medium.com/tenable-techblog/decrypt-encrypted-stub-data-in-wireshark-deb132c076e7

🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ cube0x0, Cube0x0 ]

How do you work in security without having to talk?

🐥 [ tweet ]

хакеров-интровертов тред
😈 [ cube0x0, Cube0x0 ]

🐥 [ tweet ]
😈 [ NotMedic, Tim McGuffin ]

I don't know what to do with this knowledge, but today I learned that curl has a handler for LDAP URIs.

curl --user $CREDS "ldaps://ldap.foo.com/DC=ads,DC=foo,DC=com?memberOf?sub?(&(sAMAccountName=$USER)(memberOf=CN=$GROUP,OU=Distribution,OU=Groups,DC=ads,DC=foo,DC=com))"

🐥 [ tweet ]
😈 [ C5pider, 5pider ]

The Havoc Framework
https://t.co/eBpOaicsI6

🔗 https://github.com/HavocFramework/Havoc

🐥 [ tweet ]

так, дождались сорцов
🔥3
😈 [ MrUn1k0d3r, Mr.Un1k0d3r ]

You want to use signed PowerShell noscripts?

Have a look at all the signed PowerShell noscripts located in C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\

Some of these can execute code and do all kind of interesting stuff.

https://t.co/7uBzACJ4JP

#redteam

🔗 https://github.com/Mr-Un1k0d3r/ATP-PowerShell-Scripts

🐥 [ tweet ]
🔥1
😈 [ theluemmel, ADCluemmelSec ]

UPDATES to ADCS blog.
@ly4k_ gave so much input I had to implement.
@n00py1 gave a really good hint for ESC5 with his question.

So here goes:
ESC2 - Update how it works
ESC4 - Automation via Certipy
ESC5 - Full attack path
Bonus - Bloodhound Integration
https://t.co/iWvY9gTIAM

🔗 https://luemmelsec.github.io/Skidaddle-Skideldi-I-just-pwnd-your-PKI/

🐥 [ tweet ]
😈 [ 0xdf_, 0xdf ]

Scrambled from @hackthebox_eu disabled NTLM auth, breaking how I typically interact with a Windows host. .NET RE, Silver Tickets, Kerberoasting. I'll show attacking from both Windows and Linux. And JuicyPotatoNG in Beyond Root.

https://t.co/ER0RUaEApA

🔗 https://0xdf.gitlab.io/2022/10/01/htb-scrambled.html

🐥 [ tweet ]
😈 [ itm4n, Clément Labro ]

Some news about PrivescCheck! 📰

If you are a Metasploit user, please note that I finally solved a (stupid) issue that prevented the noscript from working properly with "powershell_execute". 🥳

More info on GitHub.
👉 https://t.co/OZfgHlAq8S
👉 https://t.co/UvD5hRwBey

🔗 https://github.com/itm4n/PrivescCheck#metasploit-timeout
🔗 https://github.com/itm4n/PrivescCheck/issues/27

🐥 [ tweet ]
😈 [ mrd0x, mr.d0x ]

Chromium's application mode can be used to easily build realistic phishing desktop applications. Enjoy.

https://t.co/rUolWjd5Ch

🔗 https://mrd0x.com/phishing-with-chromium-application-mode/

🐥 [ tweet ]
😈 [ n00py1, n00py ]

Pentest tip: Leave Pcredz, Impacket SMB server, Responder (Analyze mode), etc running all the time. You never know when a random Domain Admin will try to auth to you over NTLM.

Very typical with agentless security products.

🐥 [ tweet ]
🔥1