Offensive Xwitter – Telegram
Offensive Xwitter
19.3K subscribers
908 photos
48 videos
21 files
2.09K links
~$ socat TWITTER-LISTEN:443,fork,reuseaddr TELEGRAM:1.3.3.7:31337

Disclaimer: https://news.1rj.ru/str/OffensiveTwitter/546
Download Telegram
👹 [ snovvcrash, sn🥶vvcr💥sh ]

Based on @ippsec’s video, I’ve added two more examples on manual parsing JSONs produced by #BloodHound collectors:
1. List all members of a group (recursively).
2. List all groups which the user is a member of (recursively).

https://t.co/20cL7rms4a

🔗 https://ppn.snovvcrash.rocks/pentest/infrastructure/ad#manual-json-parsing

🐥 [ tweet ]
😈 [ 0xdf_, 0xdf ]

Timing from @hackthebox_eu had LFI, directory traversal, a side channel/timing attack, a mass assignment vulnerability, LFI+upload = RCE, and a custom downloader to exploit, all on the way to root.

https://t.co/QHYKm3OnLU

🔗 https://0xdf.gitlab.io/2022/06/04/htb-timing.html

🐥 [ tweet ]
😈 [ c3rb3ru5d3d53c, ςεяβεяμs - мαℓωαяε яεsεαяςнεя ]

#Suricata #Signature for Confluence CVE-2022-26134 #exploit #poc

ATTACK Potential URI Template Injection

https://t.co/8mVZhciNqF

🔗 https://github.com/c3rb3ru5d3d53c/signatures/blob/master/signatures/attack/injection/template/template.suricata-6.0.5.rules

🐥 [ tweet ]
😈 [ an0n_r0, an0n ]

storing creds for a runas-like utility in a saved config file is a security mistake, even if the tool offers "seriously obfuscated encrypted" files. all we need is just hooking CreateProcessWithLogonW (hello to @fridadotre) and no worries about reversing proprietary encryptions.

🔗 https://gist.github.com/tothi/dd3bdd5d9f88ffcd32be15b2ce480aa6

🐥 [ tweet ]
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Exploring data saved by Chrome/Edge/Any Chromium
https://t.co/5zAXvnmsa9 #dpapi

🔗 https://gist.github.com/jhoneill/e585bae781f3efa7ac1992b79e037713

🐥 [ tweet ]
👍2
😈 [ NinjaParanoid, Paranoid Ninja (Brute Ratel C4) ]

Hunting alertable threads for QAPC on existing processes, rop-gadgets, Stagers and start address spoofing for the upcoming BRc4 v1.1 release...
https://t.co/5GH2Nwnp74

🔗 https://www.youtube.com/watch?v=w8ictUBcCrM

🐥 [ tweet ]
😈 [ DirectoryRanger, DirectoryRanger ]

O365-Doppelganger. noscript to harvest credentials off of a user during a Red Team and get execution of a file from the user
https://t.co/0CpScve1sn

🔗 https://github.com/paranoidninja/O365-Doppelganger

🐥 [ tweet ]
👍1
😈 [ m3g9tr0n, Spiros Fraganastasis ]

Active Directory delegations inventory in Rust
https://t.co/qOoTA6X4yi

🔗 https://github.com/mtth-bfft/adeleg

🐥 [ tweet ]
😈 [ Tarlogic, Tarlogic ]

Vulnerability CVE-2022-26134 has compromised Atlassian @Confluence servers and data centers and, along the way, the security of a multitude of companies. Our colleague @TuLkHaXs analyzes the scale of the incident and how to neutralize it 👇
https://t.co/6k6ILkif0i

🔗 https://www.tarlogic.com/blog/cve-2022-26134-zero-day-vulnerability-affecting-atlassian-confluence/

🐥 [ tweet ]
😈 [ ReconOne_, ReconOne ]

GitHub Recon in Manual mode - Part 3 - Database
credits: techgaun/github-dorks

#recon #recontips #github #AttackSurface #bugbountytips #reconone #Database #gitrecon

🐥 [ tweet ]
😈 [ ptswarm, PT SWARM ]

🦥 Everyone learned to run pip install colorama to exploit Atlassian Confluence RCE (CVE-2022-26134), so let’s see how the vulnerability works under the hood.

Here we show our simplified payload which demonstrates a workflow inside the vulnerable code ⤵️

🐥 [ tweet ]
😈 [ _wald0, Andy Robbins ]

This week I'm publishing a 3 post series on #Azure Managed Identity attack paths. Here's part 1, where we are looking at Automation Accounts:

https://t.co/gZ6QjGw6CE

Prior work by @kfosaaen, @inversecos, https://t.co/Eb8grvTeOm, and @cibrax

🔗 https://posts.specterops.io/82667d17187a
🔗 http://azsec.azurewebsites.net

🐥 [ tweet ]
😈 [ _JohnHammond, John Hammond is @ RSAC ]

Active Directory content will slowly trickle out on my YouTube channel over the next many days. We will build a local VM environment, stage out our domain at will with PowerShell, and bounce back and forth between "building" and "breaking" AD concepts
https://t.co/jHw7lS1St6

🔗 https://youtu.be/pKtDQtsubio

🐥 [ tweet ]
😈 [ DebugPrivilege, • ]

I can see that most people are familiar with AD and understand the enumeration piece of it through tools like PowerView, etc. However, how does this look from a code-level and network-level? My go-to tools are IDA and Wireshark to answer these types of questions.

🐥 [ tweet ]