Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯2
β˜„οΈSensitive Information Disclosure Through Config Fileβ˜„οΈ

⚠️Steps To Reproduce:
ffuf -c -ac -r -u https://target[.]com/FUZZ -w wordlist.txt


⚠️Wordlists:
πŸ”—https://github.com/six2dez/OneListForAll
πŸ”—https://wordlists.assetnote.io/
πŸ”—https://github.com/danielmiessler/SecLists
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯5
πŸ”₯2
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating πŸ”₯

The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/HvsUY
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef

Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
IDOR.pdf
78.5 KB
πŸ‘1
Brut Security pinned «Keep Checking Old Posts 🍿»
Is X Bug Bounty Community
Anonymous Poll
38%
Toxic
62%
Great
url/?f=etc/passwd ==> 403
encode etc/passwd as base64

url/?f=L2V0Yy9wYXNzd2Q= ==> 200

#note
you can use this trick in SQL , SSTI , XSS , LFI , Etc...

By:@GodfatherOrwa

#bugbountytips #BugBounty
πŸ‘10πŸ”₯2πŸ€”2❀1
Please open Telegram to view this post
VIEW IN TELEGRAM
🀣4
πŸ’₯2 Days Left for Registration of July Batch: Extreme Web Application Penetration Testing πŸ’₯

🚨Classes Starting From- Tuesday 16 July, 4PM INDIAN STANDARD TIME

πŸ’―Registration Link- https://wa.me/message/NQLPOBIAEFDBN1

⭕️Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!
Please open Telegram to view this post
VIEW IN TELEGRAM
Find public files in Amazon S3
http://s3digger.com

Find public files in Dropbox 
https://drodigger.com

Find public files in Disk Yandex
https://yadigger.com

Find public files in Google Drive
https://drodigger.com

Find public files in other file sharing sites
https://fidigger.com

Find public files on url shortening sites
https://shortdigger.com
πŸ‘4❀2
🚨A directory traversal bug in a private Intigrity program.

πŸ’₯Payload: /****/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd

βœ…Courtesy- Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM
❀11πŸ‘4
Brut Security
🚨A directory traversal bug in a private Intigrity program. πŸ’₯Payload: /****/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd βœ…Courtesy- Click Here
/****/: This is a directory traversal sequence, which is used to navigate through the file system. The **** is a common pattern used to traverse directories, allowing an attacker to access files outside of the web root.
πŸ‘4
payloads.txt
5.3 MB
Directory-Traversal-Payloads
πŸ‘2😁1