Brut Security
15.2K subscribers
967 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
๐Ÿ“ฑJoin Our Discussion Channel๐Ÿ“ฑ
https://t.me/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Hey everyone๐Ÿ“ฃ,

โš ๏ธCan you believe it's already June? We've covered six months, but have we really dived into cybersecurity or web penetration testing yet? Have any of us snagged our first bug bounty or made it into a Hall of Fame?

๐Ÿ“ŒLet's use the next six months to change that. Dedicate yourself fully to learning and practicing. Imagine where you could be by the end of the yearโ€”skilled, confident, and maybe even recognized in the cybersecurity world.

๐Ÿ”ฅLetโ€™s go all in and fight for our freedom through knowledge and skills. Whoโ€™s ready to take on this challenge?

Cheers,
The Brut Security Team
โ˜„๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ10๐Ÿ‘1๐Ÿ’ฏ1๐Ÿ—ฟ1
2FA Security Issues.pdf
1.5 MB
๐Ÿ‘3
โŒ›RSEScanโŒ›

๐Ÿ“ฃA command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization.๐Ÿ“ฃ

๐ŸŒPOC VIDEO๐ŸŒ
๐Ÿ”—Download๐Ÿ”—
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘3๐Ÿ”ฅ1
Brut Security pinned ยซโŒ›RSEScanโŒ› ๐Ÿ“ฃA command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomainsโ€ฆยป
Reconnaissance- Phase1.pdf
1.5 MB
โ˜„๏ธBug Bounty Reconnaissance-Phase 1โ˜„๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ1
โ˜„๏ธBug-Bounty-Wordlistsโ˜„๏ธ

๐Ÿ“ฃA repository that includes all the important wordlists used while bug hunting.

๐Ÿ”—Link: https://github.com/YaS5in3/Bug-Bounty-Wordlists


#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘6
Top Useful Extension For Pentesting and Bug hunting
๐Ÿ‘3โค1
๐Ÿ’ฅBug Bounty Tip: Don't Overlook Image Endpoints!๐Ÿ’ฅ

๐Ÿ‘‰Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:

1. Gather All Target Endpoints: Collect endpoints from your target.

2. Filter for Image Extensions: Use a simple command to isolate image URLs.

cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt

3. Check for Live URLs: Ensure the filtered image URLs are active.

4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.

โ„น๏ธ Success Story by GodfatherOrwa:
-He found a passport image at app[.]com/xxxx/cdn/file/xxx.jpg.
- Visiting app[.]com/xxxx/cdn/ revealed an open directory listing.
- The result? Tons of exposed PII!

๐Ÿ‘ŒAlways check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!

Happy hunting, everyone! โ™ฅ

Credit: @godfatherorwa

#bugbountytips #bugbountytip #bugbounty
๐Ÿ‘5
Brut Security pinned Deleted message
Blind SQL Payloads
๐Ÿ”ฅ7๐Ÿ‘2
Media is too big
VIEW IN TELEGRAM
โš ๏ธCVE-2024-29973: Unauthorized command injection in Zyxel NAS devicesโš ๏ธ

๐Ÿ”This command injection vulnerability in the โ€œsetCookieโ€ parameter in Zyxel NAS326 and NAS542 devices could allow an unauthenticated attacker to execute some OS commands by sending a crafted HTTP POST request.

๐Ÿ“ŒPoC: https://github.com/k3lpi3b4nsh33/CVE-2024-29973

๐Ÿ“ฃDorks:
๐Ÿ”ฝHunter: product.name="ZyXEL NAS542"||http://product.name="ZyXEL NAS326"
๐Ÿ”ผFOFA: app="NAS542" || app="ZYXEL-NAS326"
๐Ÿ”ฝSHODAN: http.title:"Zyxel NAS326"
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฏ6โค1
This media is not supported in your browser
VIEW IN TELEGRAM
โš ๏ธProgressive Web App (PWA) Phishingโš ๏ธ

๐Ÿ“ŒAttack Scenario: A user lands on index.html and clicks the "Install Microsoft Application" button. The install app prompt appears and once it is installed by the user, the JavaScript embedded in index.html redirects the PWA window to the phishing page that hase a fake URL bar at the top (i.e. mrd0x.html). Ensure that you're testing this over HTTPS to avoid encountering issues.

๐Ÿ“ฃBlog Link: https://mrd0x.com/progressive-web-apps-pwa-phishing

๐Ÿ”—POC: https://github.com/mrd0x/PWA-Phishing

โš ๏ธThis is simply to demonstrate how PWA phishing works. Don't use it for illegal purposes.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ3โค1
Web Cache Deception & Poisoning.pdf
297.3 KB
๐Ÿ”ฅ2๐Ÿคฏ1
cache posioning writeup by ankit.pdf
1.2 MB
๐Ÿ”ฅ2
๐Ÿ”ผ One-Liner XSS ๐Ÿ”ฝ

subfinder -dL domainlist1.txt | dnsx | shuf | (gau | | hakrawler) | anew | egrep -iv "\.(jpg|jpeg|gif|tif|tiff|png|ttf|woff|woff2|php|ico|pdf|svg|txt|js)$" | urless | nilo | dalfox pipe -b https://xss.hunter
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ8๐Ÿ‘1
Brut Security pinned ยซKeep checking my old Posts to continue your learning Process!ยป