π¨ Warning to All Members π¨
Brut Security is a professional community focused strictly on learning and discussing cybersecurity topics. Any personal questions about religion, race, or similar matters are strictly prohibited. We are here to learn and grow as ethical hackers, not to engage in discussions unrelated to cybersecurity.
Please adhere to these guidelines:
1. Keep all conversations focused on cybersecurity topics.
2. Avoid personal questions about membersβ religious or cultural backgrounds.
3. Show respect for all membersβthis is a safe, professional space.
Failure to follow these rules will lead to immediate removal from the group.
For Queries Related to Enrolment or Other Questions, Do Reach here @brutsecurity_bot
Brut Security is a professional community focused strictly on learning and discussing cybersecurity topics. Any personal questions about religion, race, or similar matters are strictly prohibited. We are here to learn and grow as ethical hackers, not to engage in discussions unrelated to cybersecurity.
Please adhere to these guidelines:
1. Keep all conversations focused on cybersecurity topics.
2. Avoid personal questions about membersβ religious or cultural backgrounds.
3. Show respect for all membersβthis is a safe, professional space.
Failure to follow these rules will lead to immediate removal from the group.
For Queries Related to Enrolment or Other Questions, Do Reach here @brutsecurity_bot
π₯12β€11π6
Happy Diwali to the Brut Security Community!
Wishing everyone a joyful and prosperous Diwali! May this festival of lights bring happiness, success, and new learning opportunities to all.
Whether youβre celebrating or just enjoying the festive spirit, let's continue to shine brightly together as a global community. Hereβs to knowledge, growth, and unity!
Stay safe, stay inspired, and Happy Diwali! πͺ
Wishing everyone a joyful and prosperous Diwali! May this festival of lights bring happiness, success, and new learning opportunities to all.
Whether youβre celebrating or just enjoying the festive spirit, let's continue to shine brightly together as a global community. Hereβs to knowledge, growth, and unity!
Stay safe, stay inspired, and Happy Diwali! πͺ
1β€15π2
CVE-2024-50550: Privilege Escalation in LiteSpeed Cache WP Plugin, 8.1 rating π₯
Weak security hash verification vulnerability allows an attacker to gain administrative privileges.
Search at Netlas.io:
π Link: https://nt.ls/A60iV
π Dork: http.body:"plugins/litespeed-cache"
Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
Weak security hash verification vulnerability allows an attacker to gain administrative privileges.
Search at Netlas.io:
π Link: https://nt.ls/A60iV
π Dork: http.body:"plugins/litespeed-cache"
Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
π3
Brut Security
Best Motivation Tip Ever
But Our Bro is Killing It ππ Happy Diwali and π
πΏ12π₯5π1π³1
CVE-2024-49768: Race Condition in Waitress Python server, 9.1 rating π₯
Due to an error, the server can process a request even if the connection should have been closed.
Search at Netlas.io:
π Link: https://nt.ls/VYS9t
π Dork: http.headers.server:"waitress"
Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
Due to an error, the server can process a request even if the connection should have been closed.
Search at Netlas.io:
π Link: https://nt.ls/VYS9t
π Dork: http.headers.server:"waitress"
Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
π2πΏ2
Setup and host your own blind XSS and SSRF testing tool for free https://github.com/Rahim7X/Argus.git
2π₯9π2
π‘οΈ List of Websites Giving Free RDP/VPS π₯οΈ
πΉ sadd.io π
πΈ vpswala.org π
πΉ ihor.ru π»
πΈ gratisvps.net π
πΉ ionos.com βοΈ
πΈ vultr.com βοΈ
πΉ skysilk.com π
πΈ yellowcircle.net π
πΉ apponfly.com/en π²
πΈ cloudsigma.com π
πΉ ezywatch.com/freevps πΉοΈ
πΈ digitalocean.com π³
πΉ ctl.io/free-trial π
πΈ developer.rackspace.com π οΈ
πΉ my.letscloud.io/sign-up β¨
πΈ ohosti.com/vpshosting.php π
πΉ neuprime.com/l_vds3.php π₯οΈ
π Note: Some websites may require π³ credit card verification for trial access.
πΉ sadd.io π
πΈ vpswala.org π
πΉ ihor.ru π»
πΈ gratisvps.net π
πΉ ionos.com βοΈ
πΈ vultr.com βοΈ
πΉ skysilk.com π
πΈ yellowcircle.net π
πΉ apponfly.com/en π²
πΈ cloudsigma.com π
πΉ ezywatch.com/freevps πΉοΈ
πΈ digitalocean.com π³
πΉ ctl.io/free-trial π
πΈ developer.rackspace.com π οΈ
πΉ my.letscloud.io/sign-up β¨
πΈ ohosti.com/vpshosting.php π
πΉ neuprime.com/l_vds3.php π₯οΈ
π Note: Some websites may require π³ credit card verification for trial access.
π13
Find sensitive files using Wayback
#bugbountytip #bugbounty #bugbountytips
waybackurls 123.com | grep - -color -E "1.xls | \\.tar.gz | \\.bak | \\.xml | \\.xlsx | \\.json | \\.rar | \\.pdf | \\.sql | \\.doc | \\.docx | \\.pptx | \\.txt | \\.zip | \\.tgz | \\.7z"
#bugbountytip #bugbounty #bugbountytips
1π13β€4π₯3
a XSS payload with Alert Obfuscation, for bypass Regex filter
#infosec #cybersec #bugbountytip
<img src="X" onerror=top[8680439..toString(30)](1337)>
<script>top[8680439..toString(30)](1337)</script>
#infosec #cybersec #bugbountytip
β€11π6
Reduce Noise in Burp Suite with This Simple Trick! π₯
π‘ Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
If you have any other filters to do share, drop it on comments!
π‘ Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\..*
If you have any other filters to do share, drop it on comments!
1β€15π9
AZURE_OPENAI_API_KEY /[a-f0-9]{32}$//ATATT3[a-zA-Z0-9_\-+=]{184,195}$/#CyberSecurity #BugBounty #infosec #BugBountyTools #pentest #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
π4β€1
Check for Subdomain Takeover Vulnerabilities
This enumerates subdomains and checks if they resolve. Subdomains that return NXDOMAIN may be vulnerable to takeover if they point to external services.
Replace nasa.gov with your target.
This enumerates subdomains and checks if they resolve. Subdomains that return NXDOMAIN may be vulnerable to takeover if they point to external services.
subfinder -d target.com -silent | while read sub; do host $sub; done | grep "NXDOMAIN"
Replace nasa.gov with your target.
π12πΏ6
Hey everyone!
- Access challenging, real-world environments to hone your skills.- Tackle new labs like Odyssey and Ascension as they roll out.
- Join a community of dedicated hackers pushing their skills to new heights.
Letβs hack and learn together!
Please open Telegram to view this post
VIEW IN TELEGRAM
π3β€2π₯1