Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
🚨CVE-2024-23692: Unauthenticated RCE Flaw in Rejetto HTTP File Server

πŸ‘‰It allows remote attackers to execute arbitrary code on affected servers without authentication, potentially leading to data breaches, ransomware attacks, and complete system compromise.

πŸ’₯PoC: https://github.com/rapid7/metasploit-framework/pull/19240

πŸ’₯Dorks:
Hunter: /product.name="HTTP File Server" and web.body="Rejetto"
FOFA: product="HFS"
SHODAN: product:"HttpFileServer httpd"

#Rejetto #HFS #bugbounty #bugbountytips #cybersecurity #pentesting
πŸ”₯2
πŸ”«Smap - passive Nmap like scanner built with shodan.io

😠Smap is a port scanner built with shodan.io's free API. It takes same command line arguments as Nmap and produces the same output which makes it a drop-in replacament for Nmap.

🀨 Read more: https://github.com/s0md3v/Smap

😐#infosec #cybersecurity #hacking #pentesting #security
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯3❀‍πŸ”₯1
βš”οΈPentest-Windows
πŸ”°Windows11 Penetration Suite Toolkit

πŸ“ŒA Windows penetration testing environment that works out of the box.

⚠️This project was created for educational purposes and should not be used in environments without legal authorization.

πŸ”—Link: https://lnkd.in/gtX3GbR8

πŸ”–#infosec #cybersecurity #hacking #pentesting #security #infosec #cybersecurity #hacking #pentesting #security #oscp #ceh #nmap #infosec #hackingtools #networksecurity
πŸ”₯1
Advanced IDORs - 9 Techniques by Intigriti:

1. Exploiting Basic IDORs

How to: Modify a predictable numeric ID in the request URL or parameters.
Example: GET /user/email?userId=1002 (change userId to another value).

2. Exploiting IDORs via Parameter Pollution

How to: Inject multiple instances of the same parameter in the request.
Example: POST /update_profile with user_id=1234&user_id=5678.

3. Exploiting IDORs via JSON Globbing

How to: Manipulate JSON fields with arrays, booleans, wildcards, or large integers.
Example: { "user_id": ["1234", "5678"] } or { "user_id": "*" }.

4. Exploiting Method-Based IDORs

How to: Change the HTTP method to bypass access controls.
Example: Change GET /user/data to POST /user/data.

5. Exploiting Content-Type-Based IDORs

How to: Alter the Content-Type header to manipulate request processing.
Example: Use Content-Type: application/json instead of Content-Type: text/plain.

6. Exploiting IDORs via Deprecated API Versions

How to: Use older API versions that may lack updated security checks.
Example: Access /v1/user/data instead of /v2/user/data.

7. Exploiting IDORs in APIs that Use Static Keywords

How to: Replace keywords like current or me with numerical user IDs.
Example: Change /user/profile/current to /user/profile/1002.

8. Exploiting IDORs that Require Unpredictable IDs

How to: Find references to UUIDs or hashes in other parts of the application.
Example: Extract UUID from profile URLs like /profile/123e4567-e89b-12d3-a456-426614174000.

9. Exploiting Second-Order IDOR Vulnerabilities

How to: Manipulate stored IDs used in subsequent processes.
Example: Submit a form that stores your ID, then trigger an export process that retrieves data using that stored ID.
----------------------------------------------------------

I've never seen real-world examples for some of them, but they are definitely worth the try.

#pentesting #appsec #bugbounty #cybersecurity

Here's the full scoop: https://buff.ly/3zfhhzL
⚑️Burp Suite for Pentester

ℹ️This cheat sheet is built for Bug Bounty Hunters and penetration testers to help them hunt the vulnerabilities. It is designed such that beginners can understand the fundamentals and professionals can brush up their skills with the advanced options.

πŸ”Ή Web Scanner & Crawler
πŸ”ΉFuzzing with Intruder (Part3)
πŸ”ΉFuzzing with Intruder (Part2)
πŸ”ΉFuzzing with Intruder (Part1)
πŸ”ΉXSS Validator
πŸ”ΉConfiguring Proxy
πŸ”ΉBurp Collaborator
πŸ”ΉHackBar
πŸ”ΉBurp Sequencer
πŸ”ΉTurbo Intruder
πŸ”ΉEngagement Tools
πŸ”ΉPayload Processing Rule (Part2)
πŸ”ΉPayload Processing Rule (Part1)
πŸ”ΉBeginners Guide to Burpsuite Payloads (Part2)
πŸ”ΉBeginners Guide to Burpsuite Payloads (Part1)
πŸ”ΉEncoder & Decoder Tutorial
πŸ”ΉActive Scan++
πŸ”ΉSoftware Vulnerability Scanner
πŸ”ΉBurp’s Project Management
πŸ”ΉRepeater

πŸ”—Link: https://github.com/Ignitetechnologies/BurpSuite-For-Pentester

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4πŸ”₯2🫑1
πŸ”List of GitHub Dorks for bug bounties.

πŸ“‹Finding
target Files, Languages, API Keys,
Tokens, Usernames, Passwords, Information using
Dates, Extension πŸ““

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
πŸ”₯7πŸ‘1
πŸ› οΈGuide to Active Directory Hacking

πŸ“Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.

πŸ“° Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
πŸ”Top 10 Shodan Dorks

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
πŸ‘3πŸ‘1
Ultimate Nmap Commands Cheat Sheet 🧿

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
❀12
πŸ“š Good collection of cheat sheets, guides and resources on #Pentesting, reverse engineering and exploit dev πŸ›‘οΈ

- https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html
πŸ”₯15❀5πŸ‘3πŸ—Ώ2
πŸ’‘ IDOR Bypass Bug Bounty Tip

Sometimes APIs behave unexpectedly when multiple IDs are passed together.

πŸ” Scenario
β€’ Victim’s ID: 5200
β€’ Attacker’s ID: 5233

🚫 GET /api/users/5200/info β†’ Access Denied
βœ… GET /api/users/5200,5233/info β†’ Bypass Successful

πŸ“Œ Always test for comma-separated, array-style, or batch ID parameters when hunting for IDOR!

#bugbountytips #bugbounty #infosec #cybersecurity #api #IDOR #pentesting #bugbountyTips
πŸ”₯28πŸ‘12❀10πŸ‘2
🚨Introducing BrutDroid – The Ultimate Android Emulator Automation Toolkit🚨

✨Root, Bypass, Intercept β€” all in just a few clicks.
✨Powered by Frida, Magisk & Burp. Designed for Hackers.
πŸ’₯Automate your mobile testing workflow.
πŸ’₯Clean UI, real power, zero hassle.

▢️See BrutDroid in Action: https://youtu.be/8iYf5lJOmXo
➑️GitHub: https://github.com/Brut-Security/BrutDroid/

#BrutDroid #AndroidHacking #BugBounty #Frida #BurpSuite #Pentesting #AutomationTools #BrutSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯45❀7πŸ‘7😁2
πŸ”₯ Exclusive ZoomEye Offer for Brut Security Members

βœ…ZoomEye is giving Brut Security members 5% off any membership plan β€” monthly or yearly β€” through our special link.

πŸ“Œ How it works:

✦ Click our link:
https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96
✦ Get instant 5% discount on your purchase

πŸ’‘ Perfect for bug bounty hunters, pentesters, and researchers who rely on fast, deep internet asset scanning.

#bugbounty #pentesting #osint #cybersecurity #tools
πŸ”₯3❀1
πŸ”₯ Brut Practical Web Pentesting with concepts of Bug Bounty πŸ”₯

Learn to Hack. Defend. Earn.

βœ”οΈ Deep Dive into Advanced Vulnerabilities
βœ”οΈ Real-World Bug Bounty Methodologies
βœ”οΈ Hands-on Labs & Practical Scenarios
βœ”οΈ Recon to Exploitation & Post-Exploitation
βœ”οΈ Reporting & Professional Pentest Approach

πŸ“… New Batch Starts Soon
πŸ’» Online Live Classes
πŸ‘¨β€πŸ« Trainer: Saumadip (Brut Security)
✨ DM: @wtf_brut

πŸ“± Whatsapp: +918945971332
πŸ“§ info@brutsec.com

🌐 brutsec.com

#bugbounty #pentesting #ethicalhacking #cybersecurity
❀10πŸ”₯3πŸ—Ώ1