Cube0x0

1.3K posts

Cube0x0

Cube0x0

@cube0x0

https://t.co/rOLNaoDtZK -founder 🇸🇪

Sverige Katılım Kasım 2017
442 Takip Edilen11.5K Takipçiler
Cube0x0 retweetledi
Andrea P
Andrea P@decoder_it·
I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…
English
2
150
350
19.5K
Cube0x0
Cube0x0@cube0x0·
@ShitSecure Nice! Totally missed that one Thanks for sharing
English
1
0
2
721
Cube0x0
Cube0x0@cube0x0·
If you wanna do it in c#, merge this with the og krbrelay https://github[.]com/CICADA8-Research/RemoteKrbRelay
Andrew Oliveau@AndrewOliveau

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 #1" target="_blank" rel="nofollow noopener">ibm.com/think/x-force/…

English
1
4
58
7.1K
Cube0x0
Cube0x0@cube0x0·
@passthehashbrwn Make it 8 and you'll qualify for hosting your training at defcon!
English
0
0
23
1.9K
Cube0x0
Cube0x0@cube0x0·
I asked myself, how difficult would it be to run a 0xC2 agent in a non-rooted Samsung phone, via an APK installation, and use it for lateral movement Turns out, not very difficult at all
Cube0x0 tweet media
English
6
7
108
7.6K
Cube0x0 retweetledi
Andrea P
Andrea P@decoder_it·
M'm glad to release the tool I have been working hard on the last month: #KrbRelayEx A Kerberos relay & forwarder for MiTM attacks! >Relays Kerberos AP-REQ tickets >Manages multiple SMB consoles >Works on Win& Linux with .NET 8.0 >... GitHub: github.com/decoder-it/Krb…
Andrea P tweet media
English
15
231
547
50.6K
Marc Smeets
Marc Smeets@MarcOverIP·
Happy to see more offsec dev entrepreneurs entering the field! For example: 0xc2.io, msecops.de and phantomsec.tools. Although only smaller tools and not big tool sets as @OutflankNL Security Tooling, I still welcome this new competition!
English
6
18
92
11.5K
Rasta Mouse
Rasta Mouse@_RastaMouse·
@cube0x0 Oh man, did you write the AST parser yourself? That sounds horrendous.
English
1
0
1
1.3K
Cube0x0
Cube0x0@cube0x0·
I have received a few questions about reusing existing open-source and in-house BOFs in 0xC2 so I am leaving it here for visibility. Yes the 0xC2 Windows agent has a backward-compatible layer so you can reuse your existing object file tools after converting the Sleep script to Lua. To help with that we have provided a script that translates your Sleep code to AST and then AST to Lua. It's not 1:1 but helps with 90+% of the work.
Cube0x0 tweet media
English
1
7
71
8.5K
Cube0x0
Cube0x0@cube0x0·
@redteamcore You can have concurrency(serve multiple connections) in your server without multi threading. Creating threads is only needed for coerce
English
0
0
0
416
kyxiaxiang
kyxiaxiang@redteamcore·
@cube0x0 Does your BOF use multi threading?🥰
English
1
0
0
425
Cube0x0
Cube0x0@cube0x0·
Don't we all get to the point where all you want to do is capture and relay NTLM and Kerberos authentications in a BOF? It's just faster to write a capture & relaying framework in C for ntlm, kerberos, dcom, smb, http, mssql with native Windows support than fixing impacket. Available for 0xC2 clients in the coming update
Cube0x0 tweet media
English
5
45
279
22.7K
Cube0x0
Cube0x0@cube0x0·
@Cyb3rMonk Lol no, that would have been weird. Everything happens inside the beacon process
English
1
0
7
1.3K
Mehmet Ergene 🔸
Mehmet Ergene 🔸@Cyb3rMonk·
@cube0x0 Do you still reverse proxy over SOCKS or does everything happen inside the beacon process?
English
1
0
2
1.4K
Cube0x0
Cube0x0@cube0x0·
@ShitSecure @zeroSteiner That and the packets sent over the network from the impacket server and client scripts do not blend in very well
English
0
0
2
470
Cube0x0 retweetledi
Andrea P
Andrea P@decoder_it·
Is Kerberos relaying so limited? I'd say no, thanks to @tiraniddo CredMarshalTargetInfo trick. In this case, I'm relaying SMB to HTTP (ADCS) with a modified version of @cube0x0 krbrelay using DFSCoerce and PetitPotam - classic ESC8 attack with Kerberos, no DCOM involved ;)
Andrea P tweet mediaAndrea P tweet media
English
10
111
343
57.6K