Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
๐Ÿšจ Bug Bounty / Red Team Tip

CVE-2026-21643 โ€” Critical Pre-Auth SQL Injection (CVSS 9.1) in FortiClient EMS 7.4.4 (multi-tenant mode only)

Unauthenticated attackers can inject arbitrary SQL via the Site HTTP header to the public endpoint /api/v1/init_consts (or login endpoint). This happens before authentication and hits the PostgreSQL backend with superuser-level access in many setups โ†’ full DB dump, schema extraction, or RCE (via PostgreSQL features like COPY FROM PROGRAM).

- Affected: Only FortiClient EMS 7.4.4 (multi-tenant/Sites feature enabled)
- Not affected: 7.2.x, 8.0.x, single-site deployments
- Fixed: Upgrade to 7.4.5 or later
- Status: Actively exploited in the wild + public PoCs available

Main Detail Article (Highly Recommended):
Bishop Fox deep-dive with exploitation paths, payloads (e.g., pg_sleep(5) for blind testing), and lab results โ†’
https://bishopfox.com/blog/cve-2026-21643-pre-authentication-sql-injection-in-forticlient-ems-7-4-4

Public PoC (GitHub):
https://github.com/0xBlackash/CVE-2026-21643

Useful Google/Shodan Dorks:
- http.title:"FortiClient EMS" "7.4.4"
- http.html:"FortiClient Enterprise Management Server"
- http.favicon.hash: -specific-hash (or search for EMS login page)
- Shodan: "Model: FCTEMS" or "FortiClient EMS"

Quick Check:
If your EMS login page is internet-facing and running 7.4.4 with multi-tenant enabled โ†’ patch ASAP or block public access. Thousands of instances are exposed (Shadowserver ~2k+, Shodan ~1k+).

High-value target for hunters. Patch or restrict immediately!

#BugBounty #RedTeam #Fortinet #CVE202621643 #SQLi
โค12๐Ÿ‘4๐Ÿ”ฅ4
Please donโ€™t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the โญ๏ธ to show your support. Thanks!๐Ÿ˜‹๐Ÿ˜‹๐Ÿ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
5โค12
Hey Hunters,

DarkShadow here back again!

out-of-scope target can lead to an in-scope critical vulnerability!
The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further whatโ€™s going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.

But hereโ€™s the twistโ€”it was still showing the content from the original website I had requested. So I thought, maybe itโ€™s working like a proxy?

Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside itโ€”a config.php file.

Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessibleโ€”not just localhost!

I tried connectingโ€ฆ and boom! I was successfully connected.
But waitโ€”this domain is out of scope, right?

Thatโ€™s what I thought tooโ€ฆ until I started reading there massive database and was shockedโ€”
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.


At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly thatโ€”added an admin user to the database.

Now, on the target website, thereโ€™s a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?

BOOM! ๐Ÿ’ฅ
It logged me into the admin dashboard.


And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.โœ…


So guys, if you enjoyed this method, donโ€™t forget to show some loveโ€”and please, pray for me, Iโ€™m really sick right now.

And donโ€™t forget to follow me on X (Twitter):
x.com/Darkshadow2bd

#bugbountytips #infosec
โค7๐Ÿ‘2
โญ๏ธAutomates Active Directory pentesting from DNS to Domain Admin
๐Ÿ”ฅhttps://github.com/ADScanPro/adscan
Please open Telegram to view this post
VIEW IN TELEGRAM
โค5
Brut Security pinned Deleted message
๐Ÿ”ฅ XSSnow โ€” Advanced XSS Payload Generator & Testing Platform
โš”๏ธ Dynamic XSS Payload Generation for Web Security Testing

๐Ÿ“Œ GitHub Repository

๐Ÿ‘‰ https://github.com/dr34mhacks/xssnow

๐Ÿ“Œ Live Payload Platform
๐Ÿ‘‰ https://xssnow.in/payloads.html
โค9
๐Ÿš€ Snapchat SSL Bypass (2026) is now available โ€” arm64-v8a only

Iโ€™ve just released my custom Frida SSL bypass script for the Snapchat Android application, fully updated to support the latest 2026 versions.

โœ… Supported architecture: arm64-v8a only

Built and tested by me from scratch to support mobile security research, traffic inspection, and dynamic application analysis.

๐Ÿ”— Frida CodeShare: https://codeshare.frida.re/@mr-blackhole/snapchat-ssl-bypass-all-new-version-of-2026/

Credit @shaho_it
โค13
๐ŸšจPayment Bypass Bug Lab - Master Payment Exploits Easily.

Lab 01: Price Modification
Lab 02: Direct Path Access
Lab 03: Permission Bypass

โœ…https://github.com/ItsRishika/Payment-bypass-bug-lab
๐Ÿ—ฟ2
๐Ÿ•ธ๏ธ๐—ข๐—ฆ๐—˜๐—— ๐—ก๐—ผ๐˜๐—ฒ๐˜€:
(๐—ข๐—ณ๐—ณ๐—ฒ๐—ป๐˜€๐—ถ๐˜ƒ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜ ๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—ฒ๐—ฟ)

๐Ÿ“‹List:

โ€ขx86 Intel Assembly
โ€ขPortable Executable File Format
โ€ขWinDBG
โ€ขWinDbg Automation with Python
โ€ขIDA
โ€ขStack Overflows
โ€ขSEH Overflows
โ€ขEggHunters
โ€ขReverse Engineering For Bugs
โ€ขDEP Bypass
โ€ขASLR Bypass
โ€ขFormat Strings Vulnerabilities
โ€ขPracticing

Link ๐Ÿ”—:-
https://zeyadazima.com/notes/osednotes/

๐Ÿ”–#infosec #cybersecurity #hacking #pentesting #security
1๐Ÿ”ฅ17โค5๐Ÿ‘2
๐Ÿ‘‰๐Ÿ‘‰๐Ÿ‘‰๐Ÿ‘‰Please donโ€™t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the โญ๏ธ to show your support. Thanks!๐Ÿ˜‹๐Ÿ˜‹๐Ÿ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
โค9
๐Ÿ”ฅ BlueHammer โ€” Windows Defender 0-Day Privilege Escalation PoC
โš”๏ธ Unpatched Windows Zero-Day Exploit (SYSTEM Access)

๐Ÿ“Œ GitHub Repository
๐Ÿ‘‰ https://github.com/Nightmare-Eclipse/BlueHammer
โค7๐Ÿ‘1
Brut Security
10 Free Coupons - https://topmate.io/saumadip/2009859?coupon_code=awxe
New Contents will be added every month without any extra cost
๐Ÿ”ด LIVE CLASS ALERT โ€” Don't scroll past this.

๐Ÿ’ป Brut Security is launching a Practical Web Pentesting Live Class โ€” and seats are limited.

๐Ÿ—“๏ธ Starts: May 4
๐ŸŽฏ Mode: Online (Live)

โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€
๐Ÿ› ๏ธ What you'll learn:
โ€ข SQL Injection, XSS, IDOR, SSRF
โ€ข Authentication & Access Control Bypass
โ€ข CSRF, File Upload Attacks
โ€ข Burp Suite from scratch
โ€ข Recon, API Hacking & Reporting
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

This isn't a pre-recorded course. This is LIVE โ€” ask questions, break things in real time, and learn the way actual pentesters do.

โœ… Beginner friendly
โœ… Hands-on labs
โœ… Certificate on completion

๐Ÿ”— Enroll now โ†’ http://wa.link/brutsecurity

โšก Spots fill fast. Don't wait.

#BrutSecurity #WebPentesting #EthicalHacking #BugBounty #Cybersecurity #LiveClass
โค4
๐Ÿšจ CVE-2026-23898 & CVE-2026-23899: Critical File Deletion and Webservice Flaws Exposed in Joomla.
๐Ÿ‘‡Dorks
HUNTER : http://product.name="Joomla"
โค4
๐Ÿšจ Bug Bounty Recon Methodology ๐Ÿ” ๐Ÿž
Link: https://github.com/Maniesh-Neupane/BugBounty-Recon-Methodology
Please open Telegram to view this post
VIEW IN TELEGRAM
โค11