Brut Security pinned Β«π Advanced Web Application Penetration Testing Course - Elevate Your Cybersecurity Skills! π π Full Course Curriculum: https://brutsec.com/WebPentesting.pdf ποΈ Course Details: Starting: July 16th, 4PM IST Duration: 2 Months Schedule: 3 Days a Week Format:β¦Β»
inurl:cmd | inurl:exec= | inurl:query= | inurl:code= | inurl:do= | inurl:run= | inurl:read= | inurl:ping= inurl:& site:example[.]com
Please open Telegram to view this post
VIEW IN TELEGRAM
π3β€1
subfinder -dL subdomain.txt | grep -Eo 'https?://[^ ]+\?[a-zA-Z0-9_-]+=\d+['"'"'"]?' wayback_urls.txt > potential_sqli.txt && while read url; do sqlmap -u "$url" --batch --level 5 --risk 3 --all --random-agent --time-sec 10 ; done < potential_sqli.txt
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯6β€2
CVE-2024-6387 (and probably CVE-2006-5051): Unauthenticated RCE in OpenSSH π₯
The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.
Versions 8.5p1 to 9.8p1 ββare affected, and versions <4.4p are also potentially vulnerable.
Search at Netlas.io:
ππ» Link: https://nt.ls/ySN3C
ππ» Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)
Read more: https://www.qualys.com/regresshion-cve-2024-6387/
The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.
Versions 8.5p1 to 9.8p1 ββare affected, and versions <4.4p are also potentially vulnerable.
Search at Netlas.io:
ππ» Link: https://nt.ls/ySN3C
ππ» Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)
Read more: https://www.qualys.com/regresshion-cve-2024-6387/
π5
Please open Telegram to view this post
VIEW IN TELEGRAM
Telegram
Discussion
Community Discussion
π2
Brut Security pinned Β«β οΈ Join Our Discussion Group β οΈ π₯ https://t.me/brutsec π₯ Β»
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯3
Please open Telegram to view this post
VIEW IN TELEGRAM
π3β€1
π¨Payloads - Payload for bug bounty!π¨
π Download https://github.com/1BlackLine/Payloads
π Download https://github.com/1BlackLine/Payloads
π5π₯1
Please open Telegram to view this post
VIEW IN TELEGRAM
π3
Please open Telegram to view this post
VIEW IN TELEGRAM
π7
Please open Telegram to view this post
VIEW IN TELEGRAM
π6β€βπ₯1π₯1π1π1
This media is not supported in your browser
VIEW IN TELEGRAM
β PoC: https://github.com/bigb0x/CVE-2024-36991
Please open Telegram to view this post
VIEW IN TELEGRAM
β€2π1
Please open Telegram to view this post
VIEW IN TELEGRAM
π3