Brut Security
14.6K subscribers
907 photos
73 videos
287 files
962 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
How would I exploit arbitrary file write into RCE on modern frameworks like Node js, Flask, Django ?

By overwriting existing templates with template injection payloads. โญ
๐Ÿ‘1
โ˜„๏ธ Exciting News for Aspiring Bug Hunters! โ˜„๏ธ

๐Ÿ’ฅ Starting at the end of October, our Bug Bounty Course is designed to transform you from a beginner to a professional bug hunter. Learn the ins and outs of bug bounty hunting, including XSS, SQL Injection, and more. With 40 hours of live, online training, you'll gain the skills needed to identify and ethically report security flaws.
Don't miss this opportunity to boost your cybersecurity career!
๐Ÿ“ฑ Enroll Now!

๐Ÿ“ฑFor more details, visit National Cyber Security Services

#sponsored by
Please open Telegram to view this post
VIEW IN TELEGRAM
โš ๏ธJoin Our Discussion Group โš ๏ธ
๐Ÿ”ฅ https://t.iss.one/brutsec ๐Ÿ”ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐—๐’๐’ ๐ข๐ง ๐๐ก๐จ๐ง๐ž ๐๐ฎ๐ฆ๐›๐ž๐ซ ๐…๐ข๐ž๐ฅ๐ ? ๐Ÿ‘‡

Recently I re-watched the NahamCon2022EU: RTFR (Read The Bleeping RFC) by securinti

One thing I was surprised to find out was that phone number fields can be vulnerable to XSS.

How is that possible?

According to the RFC it is possible to append "optional parameter" to the number. Something like:

 โ€ข 10203040;๐ž๐ฑ๐ญ=+22
 โ€ข 10203040;๐ข๐ฌ๐ฎ๐›=12345
 โ€ข 10203040;๐ฉ๐ก๐จ๐ง๐ž-๐œ๐จ๐ง๐ญ๐ž๐ฑ๐ญ=๐ž๐ฑ๐š๐ฆ๐ฉ๐ฅ๐ž

This can lead to XSS if:

1. The library parses phone numbers according to RFC and accepts optional parameters such as "phone-context"

2. The phone number is reflected on the web interface without input validation or output encoding

So payloads like "10203040;๐ฉ๐ก๐จ๐ง๐ž-๐œ๐จ๐ง๐ญ๐ž๐ฑ๐ญ=<๐ฌ๐œ๐ซ๐ข๐ฉ๐ญ>๐š๐ฅ๐ž๐ซ๐ญ(1)</๐ฌ๐œ๐ซ๐ข๐ฉ๐ญ>" CAN be a valid phone number and trigger XSS
1๐Ÿ‘28๐Ÿ—ฟ6โค2
https://github.com/tomnomnom/gron

This is one of the best tools for dealing with large JSON data. It makes it easier to query complex JSON and turn it into different formats
I use it always to test web api that sends or receives big json blobs to understand what it's actually doing
๐Ÿ‘3
Free TryHackMe Access
If youโ€™re unable to purchase a personal voucher, you can use the following account for learning purposes:

TryHackMe Premium Account
Email: [email protected]
Password: pasderemarque@123

Please use the account responsiblyโ€”do not change or delete any settings or information.
โค86๐Ÿ‘11๐Ÿ”ฅ2
nmap.pdf
258.5 KB
๐Ÿ”ฅ10
โ˜„๏ธWindows Api Security Professional (WASP)โ˜„๏ธ

โš ๏ธThis is beginner level course & certification on windows api programming. This is the first baby step into the world of malware development, malware analysis, reverse engineering, forensics etc. This course contains videos to learn from, 20+ practice challenges to practice and an examination to achieve the certificate.

๐Ÿ”ฅhttps://redteamsorcery.teachable.com/p/windows-api-security-professional

๐Ÿ’ฅ Use our special discount code to get a flat 40% discount- 40THRIFTY
Please open Telegram to view this post
VIEW IN TELEGRAM
โค3
XSS from javascript hidden params

assetfinder *.com | gau | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"
2๐Ÿ”ฅ19๐Ÿ‘3โค2
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ฅ6๐Ÿ—ฟ3๐Ÿณ2โค1
- Register An account with email [email protected] on the target
- navigate to support section and see if there are any emails converted into support tickets

credit - NinadMishra
#bugbountytips
๐Ÿณ9๐Ÿ‘3
๐Ÿง‘โ€๐Ÿ’ปCloakQuest3r - Uncover the true IP address of websites safeguarded by Cloudflare & Others

https://github.com/spyboy-productions/CloakQuest3r
2๐Ÿ”ฅ12๐Ÿ‘3
โ˜„๏ธArgus - The Ultimate Reconnaissance Toolkit ๐Ÿ”
Argus is an all-in-one information gathering tool crafted for ethical hackers and cybersecurity experts. It seamlessly integrates network analysis, web exploration, and threat detection, all in a sleek and intuitive interface. Argus turns complex reconnaissance into an art of simplicity.
---
๐ŸŒhttps://github.com/jasonxtn/Argus
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘7
CVE-2024-9634: RCE in GiveWP WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

Another one critical vulnerability in GiveWP. This time, attackers can inject PHP code using one parameter.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/9tUYx
๐Ÿ‘‰ Dork: http.body:"plugins/give/assets/dist"

Read more: https://github.com/advisories/GHSA-6fx6-wrpf-cpgv
๐Ÿ‘5โค3
Add the file yahoo_site_admin/credentials/db.conf to your wordlist, and you might discover some juicy data.
1โค10