Offensive Xwitter – Telegram
Offensive Xwitter
19.4K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
😈 [ Flangvik, Melvin langvik ]

Updated SharpCollection! Snaffler @mikeloss , Whisker @elad_shamir and PassTheCert @AlmondOffSec has been added
https://t.co/2l3oQhZLpk

🔗 https://github.com/Flangvik/SharpCollection

🐥 [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg “Shutdown” ]

Thank you @BlWasp_ for adding Active Directory's SCCM / MECM abuse to https://t.co/L1mByz3R9Z

🔗 https://www.thehacker.recipes/ad/movement/sccm-mecm

🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ chompie1337, chompie ]

Demonstrating CVE-2022-37958 RCE Vuln. Reachable via any Windows application protocol that authenticates. Yes, that means RDP, SMB and many more. Please patch this one, it's serious!

https://t.co/ikOrTvQIJs

🔗 https://securityintelligence.com/posts/critical-remote-code-execution-vulnerability-spnego-extended-negotiation-security-mechanism/

🐥 [ tweet ]
🔥4
😈 [ 424f424f, rvrsh3ll ]

Ok fellow phishers. @Microsoft keeps harassing me via email to correct my blog post. How many of you have had success spoofing with this technique this last year? Time for them to fix this?
https://t.co/TTiUEbZhpI

🔗 https://www.blackhillsinfosec.com/spoofing-microsoft-365-like-its-1995/

🐥 [ tweet ]
😈 [ 404death, sailay(valen) ]

I just created the tool which can help to get NT AUTHORITY\SYSTEM from arbitrary directory creation bugs.
https://t.co/Mcv4HH2olT

🔗 https://github.com/binderlabs/DirCreate2System

🐥 [ tweet ]
😈 [ _nwodtuhs, Charlie Bromberg “Shutdown” ]

Updated the DACL abuse mindmap. New dark theme, used BloodHound's iconography, added the ACE inheritance path for Containers and Organizational Unit.

🧑‍🍳 The Hacker Recipes https://t.co/iMrOGWv63j

🔗 https://www.thehacker.recipes/ad/movement/dacl

🐥 [ tweet ]
This media is not supported in your browser
VIEW IN TELEGRAM
😈 [ OutflankNL, Outflank ]

New BOF released to our OST customers: Coercer

Coercer triggers a novel and non-public coercion method that forces SMB authentication from the computer account on workstations. From there on, you can for example relay to ADCS for generating a computer certificate.

🐥 [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

[BLOG]
Short post on alternate ways to impersonate access tokens in C#, including in other threads. Thanks @GuhnooPlusLinux for providing the inspiration.

https://t.co/TRdI5zuR5j

🔗 https://rastamouse.me/token-impersonation-in-csharp/

🐥 [ tweet ]
😈 [ 0xdf_, 0xdf ]

Support is the 4th box I've released on @hackthebox_eu! It retires today. Light .NET reverseing, LDAP enumeration, and genericall on the DC -> a fake machine AD attack.

Inspiration for the box comes from a @7minsec "tales of pentest pwnage" episode.

https://t.co/79G4EUS7Nt

🔗 https://0xdf.gitlab.io/2022/12/17/htb-support.html

🐥 [ tweet ]
🔥3
😈 [ Idov31, Ido Veltzman ]

I'm happy to release Venom - A C++ single header file for evasive network communication which using a stolen browser's socket to perform all of its network activities and by that can make it hard to trace it back to the process.

https://t.co/AVxQbNru3Z

#infosec #CyberSecurity

🔗 https://github.com/Idov31/Venom

🐥 [ tweet ]
😈 [ an0n_r0, an0n ]

1. remove disk from target laptop
2. virtualize system (VBoxManage convertfromraw)
3. abuse local admin (chntpw using alt booted system)
4. run mimikatz by reflective loading (bypass ESET :) )
5. extract machine cert / secrets

NEVER deploy company laptop without BitLocker.

🐥 [ tweet ]
😁5🔥2🥱1
😈 [ namazso, namazso ]

After being asked for it a few times in DMs, I decided to just publish my ptrace-less injector for x64 Linux

https://t.co/zqsP0xiJdZ

(via @namazso@mastodon.cloud)

🔗 https://github.com/namazso/linux_injector

🐥 [ tweet ]
Ля, почему это так орно
😁4
😈 [ _nwodtuhs, Charlie Bromberg “Shutdown” ]

🎅 xmas contribution to one of the tools I used most in 2022. #BloodHound

https://t.co/KqJYEOfzOs

🔗 https://github.com/BloodHoundAD/BloodHound/pull/625

🐥 [ tweet ]
😈 [ mariuszbit, mgeeky | Mariusz Banach ]

☢️ Recently we started seeing Threat Actors abusing MSI Windows Installation files for Initial Access & code execution

🔥 I now release Part 1 insights into how MSIs can be abused, PoCs for 🔴 & dissection utility for 🔵

🦠 Let me know what you think!

https://t.co/X7vi6BGQg5

🔗 https://mgeeky.tech/msi-shenanigans-part-1/
🔗 https://github.com/mgeeky/msi-shenanigans
🔗 https://github.com/mgeeky/msidump

🐥 [ tweet ]
😈 [ _RastaMouse, Rasta Mouse ]

I've been trying to get NtCreateUserProcess working in C#, but no joy yet. If anyone wants to take a stab at fixing the code, it's here:

https://t.co/ma3iuCSFjj

🔗 https://gist.github.com/rasta-mouse/2f6316083dd2f38bb91f160cca2088df

🐥 [ tweet ]