Brut Security
15.1K subscribers
965 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
πŸ”₯3
OSCP_PDF.pdf
2.3 MB
⚠️Join Our Discussion Group ⚠️
πŸ”₯ https://t.me/brutsec πŸ”₯
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘2
Brut Security pinned «⚠️Join Our Discussion Group ⚠️ πŸ”₯ https://t.me/brutsec πŸ”₯Β»
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Subprober - An essential HTTP multi-purpose Probing Tool for Penetration Testers and Security Researchers with Asynchronous httpx client support.

πŸ”₯Download: https://github.com/RevoltSecurities/Subprober
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯3
πŸ“ž Enroll Now: https://wa.me/918945971332
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘3❀1
🚨Payloads - Payload for bug bounty!🚨
πŸ”— Download https://github.com/1BlackLine/Payloads
πŸ‘5πŸ”₯1
πŸ€– Bug Bounty Target - https://bughunters.jahezgroup.com/en
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘3
β˜„οΈWill Drop A New BB Platform If We Reach 4K by Upcoming Weekβ˜„οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘7
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘6❀‍πŸ”₯1πŸ”₯1πŸ‘1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️CVE-2024-36991: Path Traversal on the β€œ/modules/messaging/β€œ endpoint in Splunk Enterprise on Windows.

πŸ“£Sign Up On Netlas.io: https://app.netlas.io/ref/9cc61538/
πŸ“£Join Official Netlas Telegram: https://t.me/netlas

πŸ”΄In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows.

βœ…PoC:
https://github.com/bigb0x/CVE-2024-36991

ℹ️Netlas Dork: http.body:"splunk-Enterprise"
Please open Telegram to view this post
VIEW IN TELEGRAM
❀2πŸ‘1
πŸ“£Understanding Bug Bounty Hunting for NewcomersπŸ“£

🎁Bug bounty hunting can seem appealing, but it’s important to know:

πŸ–±High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei to scan public programs.

πŸ–±Reality Check: Many see bug bounty hunting as a way to financial freedom or a high-paying job. However, if you have the skills to excel here, you can probably find other well-paying jobs in cybersecurity.

πŸ–±Consider Your Location: Bug bounty hunting might be more attractive if you live in a country with a low average salary. Otherwise, it’s better pursued for fun or experience rather than as your main source of income.

πŸ–±Extra Income and Experience: It can be great for earning extra money and gaining experience, but it’s not a reliable primary income source.

πŸ’³Bottom Line: Bug bounty hunting can be enjoyable and rewarding as a side activity, but it’s not the best choice for a main job once you understand the reality of the work involved.
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘3
πŸ› οΈGuide to Active Directory Hacking

πŸ“Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.

πŸ“° Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‘¨β€πŸ’»6πŸ‘3🀑2πŸ’―1
CVE-2024-39929: Bypass of attachment verification in Exim❗

Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/gRdtH
πŸ‘‰ Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"

Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
πŸ‘3