Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
🚨Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)🚨

πŸ“’PoC: https://github.com/sinsinology/CVE-2024-4358

⚠Detailed Analysis from @SinSinology https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/

πŸ‘‰Dorks:
πŸ”ΈHunter: /product.name="Telerik report server"
πŸ”ΈFOFA: app="Telerik-Report-Server"
πŸ”ΈSHODAN: http.title:"Telerik report server"
πŸ‘2
Brut Security pinned Deleted message
Media is too big
VIEW IN TELEGRAM
🚨Android SSL Pinning Bypass using Noxer🚨

πŸ‘‰Automate your Android penetration testing lab setup using Nox Emulator. Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator. It simplifies setup, enhances stability, manages Frida Server, removes unwanted bloatware, integrates BurpSuite certificates, and much more!

πŸ”—Noxer: https://buff.ly/4b0gxM4
πŸ”₯4
cve_2024_4577.py
828 B
πŸ”₯3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨CVE-2024-4577: PHP CGI Argument Injection Vulnerability🚨

⚠Dorks:
πŸ”ΈHunter: header.server="PHP"
πŸ”ΈFOFA: server="PHP"
πŸ”ΈSHODAN: server: PHP
🀯5πŸ‘2πŸ”₯2
Last Call! Hurry Up
🀣21πŸ€“3😐2
TestCases.pdf
711.3 KB
πŸ‘2🐳1
Which of the following is used for banner grabbing?
Anonymous Quiz
48%
Telnet
12%
FTP
19%
SSH
21%
Wireshark
πŸ‘1
Brut Security pinned Deleted message
Complete_Shodan_Guide.pdf
4.3 MB
πŸ”₯4πŸ‘2
🚨OneDorkForAll🚨

πŸ‘‰An insane list of all dorks taken from everywhere from various different sources. Google, Shodan, Github. Bug bounty dorks (includes private programs), shodan, github, CCTV, CMS dorks, lfi, sqli, xss, more vulns + an extra 1Mil+ dorks.

πŸ”—https://github.com/HackShiv/OneDorkForAll
πŸ”₯7🫑2❀1🀝1
🚨X-Recon: A utility for detecting webpage inputs and conducting XSS scans.🚨

Features:
1. Subdomain Discovery
2. Site-wide Link Discovery
3. Form and Input Extraction
4. XSS Scanning

πŸ”—Link: https://lnkd.in/gfAeBPz7
πŸ’―4πŸ‘2πŸ”₯1
Have Tryhackme vouchers in stock
1 Month Voucher = 500 Rupees
Dm @wtf_yodhha
This media is not supported in your browser
VIEW IN TELEGRAM
🚨noWAFpls🚨
πŸ‘‰Burp Plugin to Bypass WAFs through the insertion of Junk Data

πŸ”— https://github.com/assetnote/nowafpls
πŸ‘3πŸ”₯1🀯1
🚨CVE-2024-23692: Unauthenticated RCE Flaw in Rejetto HTTP File Server

πŸ‘‰It allows remote attackers to execute arbitrary code on affected servers without authentication, potentially leading to data breaches, ransomware attacks, and complete system compromise.

πŸ’₯PoC: https://github.com/rapid7/metasploit-framework/pull/19240

πŸ’₯Dorks:
Hunter: /product.name="HTTP File Server" and web.body="Rejetto"
FOFA: product="HFS"
SHODAN: product:"HttpFileServer httpd"

#Rejetto #HFS #bugbounty #bugbountytips #cybersecurity #pentesting
πŸ”₯2