Offensive Xwitter – Telegram
Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
⚠️ DISCLAIMER ⚠️

‼️ All information posted in this channel (https://news.1rj.ru/str/OffensiveTwitter) is intended for research and/or educational purposes only.

‼️ The owner of this channel is NOT responsible for any illegal use of the information this channel is providing or referring to.

‼️ The owner of this channel does NOT promote any illegal activity related to unethical hacking, cybercrimes, malware distribution, etc.

‼️ Remember that computer crimes are ALWAYS punishable by the law, so please do watch what you are doing.

#disclaimer
😁8
👍1
😈 [ vxunderground, vx-underground ]

We've updated the vx-underground Malware Analysis collection. We have added 13 new papers courtesy of @malpedia.

Check it out here: https://t.co/djuVYEkbLT

Have a nice day.

🔗 https://www.vx-underground.org/malware_defense.html#malware_analysis

🐥 [ tweet ]
😈 [ HackingLZ, Justin ]

Since everyone is mentioning AzureAD to protect assets instead of putting them directly on the internet...Keep this in mind for future egress detections. https://t.co/mvgebEssdW

🔗 https://www.trustedsec.com/blog/azure-application-proxy-c2/

🐥 [ tweet ]
😈 [ FSDominguez, Francisco Dominguez ]

Not only inject&forget, but you can use quantum insert/spoofed packets for bidirectional communication as well to bypass very strict firewalls.

https://t.co/D4dzlAfHrM

🔗 https://diablohorn.com/2017/05/21/quantum-insert-bypassing-ip-restrictions/

🐥 [ tweet ][ quote ]
👍1
😈 [ am0nsec, Paul L. ]

I published my little experiment with the Windows Memory Manager in order to get Virtual Address Denoscriptors (VADs) from an arbitrary process. This is a proof of concept - use caution. Will use this repository to add more stuff over time.

https://t.co/hFqH4duKLX

🔗 https://github.com/am0nsec/wkpe

🐥 [ tweet ]
😈 [ _wald0, Andy Robbins ]

Today is Friday, which means it's #BloodHoundBasics day.

Here is the recording of my @BlackHatEvents Asia presentation covering the origins of BloodHound. In particular: what problem BloodHound set out to solve in the first place: https://t.co/px9EZysXc7

🔗 https://www.youtube.com/watch?v=Yl7gwdTFK18

🐥 [ tweet ]
😈 [ HackingLZ, Justin ]

So they updated the advisory with a patch/replacement for a single file which is great...However I would suspect it won't take a lot of work to diff old vs new? Incoming PoC?

https://t.co/4lbxkVc1Ja

🔗 https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html

🐥 [ tweet ]
😈 [ theluemmel, S4U2LuemmelSec ]

Just pushed a little update to the relay / MitM blog again.
This time NTLM Downgrade attacks.
https://t.co/R7PRhcQ37F

If successfull, you can afterwards nicely do pass the hash attacks with you new NT hash :)

🔗 http://luemmelsec.github.io/Relaying-101/#ntlm-downgrade-attack

🐥 [ tweet ]
😈 [ ReconOne_, ReconOne ]

Did you hear about new Confluence CVE-2022-26134 Remote Code Execution? Try to quickly cover your Attack Surface with the help of nuclei 👇

#Confluence #reconone #recon #attacksurface #cve2022 #nuclei #bugbountytips

🐥 [ tweet ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Based on @ippsec’s video, I’ve added two more examples on manual parsing JSONs produced by #BloodHound collectors:
1. List all members of a group (recursively).
2. List all groups which the user is a member of (recursively).

https://t.co/20cL7rms4a

🔗 https://ppn.snovvcrash.rocks/pentest/infrastructure/ad#manual-json-parsing

🐥 [ tweet ]
😈 [ 0xdf_, 0xdf ]

Timing from @hackthebox_eu had LFI, directory traversal, a side channel/timing attack, a mass assignment vulnerability, LFI+upload = RCE, and a custom downloader to exploit, all on the way to root.

https://t.co/QHYKm3OnLU

🔗 https://0xdf.gitlab.io/2022/06/04/htb-timing.html

🐥 [ tweet ]