Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ Alh4zr3d, Alh4zr3d ]

Red Teamers, following my previous tweet on hiding procs, now we hide SSH connections:

"ssh -o UserKnownHostsFile=/dev/null -T user@target.com 'bash -i'"

Your user:
- is not added to /var/log/utmp
- won't appear in w or who cmd
- has no .profile or .bash_profile

#redteaming

🐥 [ tweet ]
🔥1
😈 [ HackingLZ, Justin Elze ]

This is awesome Meterpreter Gets BOF loader support for all your offensive needs. https://t.co/01W4UNgD1d

🔗 https://www.rapid7.com/blog/post/2022/10/07/metasploit-weekly-wrap-up-179/

🐥 [ tweet ]
😈 [ 0xcsandker, Carsten ]

Needed to find where a certain GPO was applied to during last engagement. Hadn't something ready to grab, so now I have. Inline and readable-friendly wrapped code here: https://t.co/EMJ2rJqvYn

🔗 https://gist.github.com/csandker/950d11632534c86012ab9c7cb592b7b5

🐥 [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

PeNet is a parser for Windows Portable Executable headers. It completely written in C# and does not rely on any native Windows APIs. Furthermore it supports the creation of Import Hashes (ImpHash), which is a feature often used in malware analysis. https://t.co/MPZvqvocfO

🔗 https://github.com/secana/PeNet

🐥 [ tweet ]
😈 [ KlezVirus, d3adc0de ]

[Video] The 4th episode of my series about Inceptor is out: "Empowering Donut with Direct and Indirect Syscalls".

In this video, we'll show how it is possible to improve the donut loader by intergating it with SW3.

https://t.co/xNK4HNz9qS

🔗 https://youtu.be/ypX7N4498xE

🐥 [ tweet ]
😈 [ ippsec, ippsec ]

Starting to play more with Elastic, so just published a video installing v8 it on Ubuntu 22. Really impressed with Fleet so far, the last time I played with Elastic it was a PITA keeping all the agent configs in sync. Fleet's auto update of agents is magic https://t.co/fbQkWgbJKW

🔗 https://www.youtube.com/watch?v=Ts-ofIVRMo4

🐥 [ tweet ]
😈 [ dec0ne, Mor Davidovich ]

Introducing ShadowSpray, it's like password spray but with shadow credentials. More info in the repo.
Huge thanks to @elad_shamir for the amazing technique and to @harmj0y (and others) for the implementation in Rubeus from which a lot of code was taken.

https://t.co/nIsnmaitfw

🔗 https://github.com/Dec0ne/ShadowSpray/

🐥 [ tweet ]
😈 [ cnotin, Clément Notin ]

AdminSDHolder also has a useful SACL, with this ACE allowing to log many actions performed on privileged objects it is applied to.
It's a lesser known feature!

🐥 [ tweet ]
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Довольно интересная статья, как обходить EDR с помощью python)))

https://www.naksyn.com/edr%20evasion/2022/09/01/operating-into-EDRs-blindspot.html

#redteam #pentest #bypass
😈 [ n00py1, n00py ]

Web vulns you should look for on an internal pentest: XXE.

We often think of XXE as a way to read local files, but you can also use it to coerce auth. HTTP NTLM does not request signing so you can easily relay it to LDAP. Web service accounts are often over permissioned.

🐥 [ tweet ]
😈 [ HackerGautam, Frooti ]

Not only crawling but you can do Subdomain Enumeration using Wayback.

⬇️
curl --insecure --silent "http://web.archive.org/cdx/search/cdx" | sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | sed "/@/d" | sed -e 's/\.$//' | sort -u

#bugbounty #hacking #infosec

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

This is how easter eggs are found 😅 @_nwodtuhs @podalirius_

🐥 [ tweet ]
🔥2
😈 [ ORCx41, ORCA ]

decided to release this, a highly capable pe packer, with a lot of nice features
https://t.co/iedhKbTlzm

🔗 https://github.com/ORCx41/AtomPePacker

🐥 [ tweet ]
😈 [ g0h4n_0, g0h4n ]

Today I share with you #RustHound🦀. A new AD collector written in #Rust for #BloodHound!
It is cross-platform, cross-compiled and generates all json files needed.

Other modules will be available as under development!🔥

Hope you will enjoy it!

https://t.co/bxjCVyocfv https://t.co/8jEcSuEdEj

🔗 https://github.com/OPENCYBER-FR/RustHound

🐥 [ tweet ][ quote ]
😈 [ FortaliceLLC, Fortalice Solutions ]

NTLM Relaying to SCCM for the win 👀👀👀 Fortalice's @Tw1sm just added SCCM support to NtlmRelayX. Check out the PR at: https://t.co/hWfNeiuqxp

🔗 https://github.com/SecureAuthCorp/impacket/pull/1425

🐥 [ tweet ]
😈 [ mpgn_x64, mpgn ]

New update on CrackMapExec 🔽

➡️ Upload/download with MSSQL -guervild
➡️ Exploit KeePass (discover, trigger) @d3lb3_ 🔥
➡️ ACL read with LDAP @BlWasp_
➡️ Check ntlmv1 (postex) @Tw1sm
➡️ Check alwayselevated (postex) -bogey3
➡️ Improved export on cmedb @gray_sec

🪂

🐥 [ tweet ]