Brut Security
15.3K subscribers
968 photos
77 videos
293 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
XSS from javascript hidden params

assetfinder *.com | gau | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"
2πŸ”₯19πŸ‘3❀2
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯6πŸ—Ώ3🐳2❀1
- Register An account with email service@intl.paypal.com on the target
- navigate to support section and see if there are any emails converted into support tickets

credit - NinadMishra
#bugbountytips
🐳9πŸ‘3
πŸ§‘β€πŸ’»CloakQuest3r - Uncover the true IP address of websites safeguarded by Cloudflare & Others

https://github.com/spyboy-productions/CloakQuest3r
2πŸ”₯12πŸ‘3
β˜„οΈArgus - The Ultimate Reconnaissance Toolkit πŸ”
Argus is an all-in-one information gathering tool crafted for ethical hackers and cybersecurity experts. It seamlessly integrates network analysis, web exploration, and threat detection, all in a sleek and intuitive interface. Argus turns complex reconnaissance into an art of simplicity.
---
🌐https://github.com/jasonxtn/Argus
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘7
CVE-2024-9634: RCE in GiveWP WordPress Plugin, 9.8 rating πŸ”₯

Another one critical vulnerability in GiveWP. This time, attackers can inject PHP code using one parameter.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/9tUYx
πŸ‘‰ Dork: http.body:"plugins/give/assets/dist"

Read more: https://github.com/advisories/GHSA-6fx6-wrpf-cpgv
πŸ‘5❀3
Add the file yahoo_site_admin/credentials/db.conf to your wordlist, and you might discover some juicy data.
1❀10
TryHackMe is now giving subscriptions in INR
1πŸ‘8πŸ”₯2
POC for CVE-2024-4577 PHP CGI Argument Injection πŸ”₯ πŸ”₯ πŸ”₯

Nuclei Template:
https://github.com/11whoami99/CVE-2024-4577/blob/main/CVE-2024-4577.yaml
1❀9πŸ‘2
Subdomain Takeover POC :
subfinder -d domain | httpx -silent > subdomains.txt ; nuclei -t /root/nuclei-templates/http/takeovers -l subdomains.txt
πŸ‘8❀1
80% bug bounties is about understanding the application/framework/protocol and (knowing about what exactly are you doing or if it's actually worth doing)
πŸ‘29πŸ”₯4πŸ—Ώ3❀1
CVE-2024-20329: Improper Neutralization of Command Delimiters in Cisco ASA, 9.9 rating πŸ”₯πŸ”₯πŸ”₯

The vulnerability allows an attacker with low privileges to remotely execute commands via SSH and thus gain full control of the system.

More then 140k instances at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Rfjme
πŸ‘‰ Dork: http.body:"/+CSCOE+/logon.html"

Vendor's advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-rce-gRAuPEUF
❀3πŸ—Ώ2πŸ‘1
Happy Sunday 🫢
πŸ—Ώ22πŸ”₯4❀2πŸ‘1
Wordpress juicy endpoints #bugbountytips
1πŸ‘9