Brut Security
15.2K subscribers
967 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
๐Ÿ‘พTrying to find Origin IP check out this tool created by @mmrecon to find IP behind WAF: https://github.com/mmarting/unwaf

#bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘4โค1๐Ÿ”ฅ1
โš ๏ธNew BBP Targetโš ๏ธ
๐Ÿš€https://security.embracecloud.nl/.well-known/security.txt
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ5
Position for SOC leader at Director/ Associate Director level to run a SOC. Position is in Noida, CTC ~60L. Pls share any reference with priti@thecyberhire.com with a cc to talent@thecyberhire.com
๐Ÿšจ New Ethical Hacking Batch Starting on 16th August! ๐Ÿšจ

Ready to dive into the world of ethical hacking? Our next batch kicks off on 16th August at 4 PM IST. Whether you're a student aiming to sharpen your cybersecurity skills or a professional looking to enhance your expertise, this course is designed for you!

๐ŸŽ“ Exclusive Offer for Students: 50% OFF (Student ID Required)

Donโ€™t miss out on this opportunity to learn the latest in penetration testing, vulnerability assessment, and more. Secure your spot today!

๐Ÿ‘‰ Register Now:
https://wa.me/message/NQLPOBIAEFDBN1
๐Ÿ‘1
Bug Bounty-The Unseen Struggle.pdf
349.2 KB
๐Ÿ’ปBug Bounty Story Time ๐Ÿ’ป
โ‡Drop A Review After Reading Itโ‡
๐Ÿ”ฅ3
โ˜„๏ธWant to learn how to hack? First, you'll need to get a good grip on these basics:

โœ”๏ธNetworking: Figure out how computers talk to each other.
โœ”๏ธCoding: Learn to build and break stuff with code.
โœ”๏ธLinux: Master this operating system โ€“ it's a hacker's playground.

๐Ÿ›กThe better you understand these, the faster you'll pick up hacking skills.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘3
๐Ÿ–ฅIf you encounter the default IIS Windows window, do not forget to add /haproxy and /netdata to your wordlist and scan them, if you gain unauthorized access here, you will earn a reward.

#bugbountytips #BugBounty
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ•Š3
๐Ÿ˜18๐Ÿ”ฅ13๐Ÿ‘1
If you've discovered an Insecure Direct Object Reference (IDOR) vulnerability where you can modify data belonging to others, here's a strategic approach to handle it:

1. Understand the Impact: First, assess the severity of the IDOR. If it allows you to modify critical data or perform actions with significant consequences, it's a high-impact vulnerability.

2. Avoid Temptation: Even though you could exploit the IDOR to change data, it's crucial not to do so without authorization. Unauthorized modification of data is a breach of trust and could lead to legal and ethical implications.

3. Proof of Concept (PoC): Create a PoC to demonstrate the IDOR. This could be as simple as changing a user's name or email address to something obvious, like "test@example.com".

4. Check for XSS Vulnerability: Before escalating the IDOR, check if the application is vulnerable to Cross-Site Scripting (XSS). If user input is echoed without proper sanitization and escaping, an IDOR could be escalated to an XSS attack.

5. Escalate to XSS: If an XSS vulnerability is found, exploit it to inject a malicious script. This could allow you to steal cookies, perform actions on behalf of the user, or even take over the user's account (Account Takeover - ATO).

Here's a simple example of how you might escalate an IDOR to an XSS attack:

- IDOR: You can change another user's name to "test".
- XSS: You find that user input is echoed without proper sanitization. So, you change the user's name to a malicious script, like
<script>alert('XSS Attack!')</script>.

6. Report the Vulnerabilities: After creating your PoCs, report the IDOR and any XSS vulnerabilities you've found to the appropriate security team. Provide clear steps on how to reproduce the issues.

Here's how you might report it:

- IDOR: "I found that I could change another user's name to any value. Here's how to reproduce it: [steps]..."
- XSS: "I found that user input is echoed without proper sanitization, allowing for XSS attacks. Here's how to reproduce it: [steps]..."
๐Ÿ‘6โค2
๐Ÿคฌ
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ15๐Ÿ”ฅ5๐Ÿ’ฏ2๐Ÿ‘1๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
โ˜„๏ธOne Shot SQLiโ˜„๏ธ
โš ๏ธNote- Don't make POC with One Shot DIOS on BB Platformsโš ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
โค4๐Ÿ‘3๐Ÿ”ฅ1๐Ÿซก1
DiosProStarFordNG.txt
4.4 KB
๐Ÿคฅ๐Ÿคฅ๐ŸคฅOne Shot DIOS๐Ÿคฅ๐Ÿคฅ๐Ÿคฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘3
โšก๏ธโšก๏ธโšก๏ธBug Bounty Tipโšก๏ธโšก๏ธโšก๏ธ

๐Ÿคก๐ŸคกNew Google Dork: Have You Checked Linktr.ee?

๐Ÿ”ผ๐Ÿ”ฝIt seems that many users unknowingly store confidential documents and access information on Linktr.ee.

๐Ÿ’ธ๐Ÿ’ธ๐Ÿ’ธTry using this dork:

`site:linktr.ee + keyword`


๐Ÿซฆ๐ŸซฆIf something valuable is found and a bounty is scored, consider sharing the success! ๐Ÿ˜‰
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘5โค2๐Ÿ‘2๐Ÿ”ฅ2
Sad Reality ๐Ÿ‘€
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฃ30๐Ÿ˜1