Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
DM: @wtf_brut
🛃WhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
📨Mail: info@brutsec.com
Download Telegram
Hey Hunter’s,
DarkShadow is here back again!

Authentication Bypass via Forged Session Cookie
(Cisco Secure Firewall Management Center)

Analysis:
-checks only for the presence of the CGISESSID cookie.
-but does not validate whether the session ID is legitimate, active, or tied to an authenticated user.

Impact:
an attacker can supply an arbitrary or default value like csm_processes to bypass the redirect to /ui/login and gain unauthorized access to the protected resource.

So Guy’s if you really enjoy to ready such as methods then show your love🤍

#bugbountytips #auth_bypass
7👍3
🚨 Fortinet just disclosed CVE-2026-39808 and CVE-2026-39813 - 2 critical vulnerabilities affecting FortiSandbox. No active exploitation itw reported as of yet.

Scan your infrastructure to find vulnerable instances:
CVE-2026-39808: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39808.yaml
CVE-2026-39813: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39813.yaml

CVE-2026-39808 (CVSS 9.1):
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.

CVE-2026-39813 (CVSS 9.1):
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.

Patches are available as per vendor advisories:
https://fortiguard.fortinet.com/psirt/FG-IR-26-112
https://fortiguard.fortinet.com/psirt/FG-IR-26-100
3🤝1
If I had a dollar for every “hack my ex” request...
😢52🔥2
Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!😋😋😋
Please open Telegram to view this post
VIEW IN TELEGRAM
4
Please open Telegram to view this post
VIEW IN TELEGRAM
Nahamsec Reconnaissance Guide
9🔥4👏3👍2😁2
Launching Soon :)
16🔥9
⚠️Just dropped something I've been building for a while

🌐A complete Web Application Bug Bounty Methodology — 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting and more.

🟢Giving away 5 free coupons to the first 5 people who drop a comment. No catch.

▶️ https://topmate.io/saumadip/2054509
🔥 Coupon Code= awxe

— Brut Security
Please open Telegram to view this post
VIEW IN TELEGRAM
54🔥3👍1👏1
Brut Security pinned «⚠️Just dropped something I've been building for a while 🌐A complete Web Application Bug Bounty Methodology — 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting…»
Sneak Peak of the Contents
3👍1🫡1🗿1
Hey Hunter’s,
DarkShadow is here back again!

Ranking Most common /api vulnerable endpoints:

/api/v1/users
/api/v1/users/{userId}
/api/v1/oauth/token
/api/v1/forgot-password
/api/v1/debug or /api/v1/status


(not only /api/v1 also test for /api/v2)

🤫if WAF blocks your request then find ip origin and it might works with out bypassing by any extra waf bypass payloads!!!

#bugbountytips #info_leak
🔥81
🔥 AutoAR = Full Bug Bounty Automation

Recon → Scan → Exploit → Report (automated)

• Subdomains (15+ sources)
• Nuclei + CVE scan
• JS secrets + GitHub leaks
• DNS takeover + misconfigs
• AI agent (FREE)
• Results → Cloudflare R2

Stop manual recon.

https://github.com/h0tak88r/AutoAR
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥97👏2
This media is not supported in your browser
VIEW IN TELEGRAM
3
Web-Check - 🕵️‍♂️ All-in-one OSINT tool for analysing any website

https://web-check.xyz/
👍94
🔥A complete Web Application Bug Bounty Methodology — 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting and more.

10 Free Coupons for New Learners--->
▶️ https://topmate.io/saumadip/2054509?coupon_code=awxe
Please open Telegram to view this post
VIEW IN TELEGRAM
👍21
Hey Hunter's,
DarkShadow is here back again!

🚨 Import schema from H2 Database → RCE via EXEC Alias

Creating an alias to execute system commands via Java Runtime

🔍 Quick Analysis:
- Default oken validation
- H2 database exposed with unsafe configurations
- Ability to create custom ALIAS → leads to RCE
- No proper input validation or restriction on JDBC params



🧠 Bug Bounty Tips:


- Always check hidden/internal endpoints like "/getSchema", "/actuator", "/env"
- Look for H2 / embedded DB usage → often misconfigured
- Try injecting JDBC params (INIT, TRACE, etc.)
- Don’t ignore default tokens or exposed headers
- Think beyond SQLi → DB features themselves can be weaponize
d



So guys if you really enjoy to read such methods show your love ❤️

#bugbountytips #rce
7😱5
🔥 Ultimate Bug Bounty Goldmine — 1000+ Real Writeups

XSS, CSRF, SSRF, IDOR, SQLi, RCE… everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.

Perfect for learning real-world exploitation, not just theory.

GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
5🔥4