Brut Security
14.6K subscribers
909 photos
73 videos
287 files
966 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
1)Finding a Hidden GraphQL Endpoint
https://medium.com/@codingbolt.in/finding-a-hidden-graphql-endpoint-56001ab29f85

2)My 2nd bounty : Referer-based access control + Response manipulation
https://medium.com/@adebayosec/my-2nd-bounty-referer-based-access-control-response-manipulation-2ab7f54d083f

3)CSRF Bypass Using Domain Confusion Leads To ATO
https://infosecwriteups.com/csrf-bypass-using-domain-confusion-leads-to-ato-ac682dd17722

4)Linear-feedback. Shift. Register
https://cyancharley.medium.com/linear-feedback-shift-register-ac6fc3298c35

5)ASCWG Reverse Engineering challenges
https://s3dny.medium.com/ascwg-reverse-engineering-challenges-778e47a5be80

6)picoCTF: No SQL Injection
https://medium.com/@baracarlo/picoctf-no-sql-injection-93a253cc4d09

7)Sunset:1 Walkthrough
https://medium.com/@nikhilbwr34/sunset-1-walkthrough-d124d06fcc93

8)Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens
https://github.com/WH1T3-E4GL3/gixposed

9)MM-ReverseIPLookup created to take a domain name and find all (A) records associated with an IP address Using Free Multiple sources,
https://github.com/FINAL094/MM-ReverseIPLookup

10)Hidden secrets and urls in JS Mass hunting || Bug bounty POC
https://www.youtube.com/watch?v=HAAG5_mSxdk
πŸ‘7❀2
CVE-2024-46483: Integer Overflow in Xlight FTP Server, 9.8 rating πŸ”₯

By overflowing the variable, an attacker could cause remote code execution on the host or a denial of service.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/M8D2R
πŸ‘‰ Dork: \*.banner:"Xlight" OR raw_tcp.response_data:"Xlight"

Read more: https://github.com/kn32/cve-2024-46483
πŸ‘3❀2
⚑️Parameter that could be vulnerable to server side request forgery !
❀13πŸ‘3
Pre-Auth RCE CyberPanel 0day by Chirag Artani πŸ”₯

Useful video from our friend's channel about one of the freshest big vulnerabilities with Netlas search πŸ”Ž

We also recommend checking out his website and Twitter for more tips:

πŸ‘‰ Site: 3rag.com
πŸ‘‰ Twitter: x.com/Chirag99Artani
πŸ”₯4❀3πŸ‘1
🚨 Warning to All Members 🚨

Brut Security is a professional community focused strictly on learning and discussing cybersecurity topics. Any personal questions about religion, race, or similar matters are strictly prohibited. We are here to learn and grow as ethical hackers, not to engage in discussions unrelated to cybersecurity.

Please adhere to these guidelines:

1. Keep all conversations focused on cybersecurity topics.
2. Avoid personal questions about members’ religious or cultural backgrounds.
3. Show respect for all membersβ€”this is a safe, professional space.

Failure to follow these rules will lead to immediate removal from the group.

For Queries Related to Enrolment or Other Questions, Do Reach here @brutsecurity_bot
πŸ”₯12❀11πŸ‘6
⚠️Join Our Discussion Group ⚠️
πŸ”₯ https://t.iss.one/brutsec πŸ”₯
Please open Telegram to view this post
VIEW IN TELEGRAM
Happy Diwali to the Brut Security Community!

Wishing everyone a joyful and prosperous Diwali! May this festival of lights bring happiness, success, and new learning opportunities to all.

Whether you’re celebrating or just enjoying the festive spirit, let's continue to shine brightly together as a global community. Here’s to knowledge, growth, and unity!

Stay safe, stay inspired, and Happy Diwali! πŸͺ”
1❀15πŸ‘2
CVE-2024-50550: Privilege Escalation in LiteSpeed Cache WP Plugin, 8.1 rating πŸ”₯

Weak security hash verification vulnerability allows an attacker to gain administrative privileges.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/A60iV
πŸ‘‰ Dork: http.body:"plugins/litespeed-cache"

Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
πŸ‘3
Best Motivation Tip Ever
1❀25πŸ‘2πŸ”₯1
Brut Security
Best Motivation Tip Ever
But Our Bro is Killing It πŸ˜‚πŸ˜‚ Happy Diwali and πŸŽƒ
πŸ—Ώ12πŸ”₯5πŸ‘1🐳1
CVE-2024-49768: Race Condition in Waitress Python server, 9.1 rating πŸ”₯

Due to an error, the server can process a request even if the connection should have been closed.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/VYS9t
πŸ‘‰ Dork: http.headers.server:"waitress"

Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
πŸ‘2πŸ—Ώ2
Setup and host your own blind XSS and SSRF testing tool for free https://github.com/Rahim7X/Argus.git
2πŸ”₯9πŸ‘2
πŸ—Ώ18πŸ”₯7🐳2❀1
πŸ—‘οΈ List of Websites Giving Free RDP/VPS πŸ–₯️

πŸ”Ή
sadd.io 🌐
πŸ”Έ
vpswala.org πŸš€
πŸ”Ή
ihor.ru πŸ’»
πŸ”Έ
gratisvps.net 🌍
πŸ”Ή
ionos.com βš™οΈ
πŸ”Έ
vultr.com ☁️
πŸ”Ή
skysilk.com 🌈
πŸ”Έ
yellowcircle.net πŸ”†
πŸ”Ή
apponfly.com/en πŸ“²
πŸ”Έ
cloudsigma.com πŸ”’
πŸ”Ή
ezywatch.com/freevps πŸ•ΉοΈ
πŸ”Έ
digitalocean.com 🐳
πŸ”Ή
ctl.io/free-trial πŸ”—
πŸ”Έ
developer.rackspace.com πŸ› οΈ
πŸ”Ή
my.letscloud.io/sign-up ✨
πŸ”Έ
ohosti.com/vpshosting.php πŸ”‹
πŸ”Ή
neuprime.com/l_vds3.php πŸ–₯️

πŸ”” Note: Some websites may require πŸ’³ credit card verification for trial access.
πŸ‘13
Find sensitive files using Wayback

waybackurls 123.com | grep - -color -E "1.xls | \\.tar.gz | \\.bak | \\.xml | \\.xlsx | \\.json | \\.rar | \\.pdf | \\.sql | \\.doc | \\.docx | \\.pptx | \\.txt | \\.zip | \\.tgz | \\.7z"


#bugbountytip #bugbounty #bugbountytips
1πŸ‘13❀4πŸ”₯3
a XSS payload with Alert Obfuscation, for bypass Regex filter

<img src="X" onerror=top[8680439..toString(30)](1337)>

<script>top[8680439..toString(30)](1337)</script>


#infosec #cybersec #bugbountytip
❀11πŸ‘6
Reduce Noise in Burp Suite with This Simple Trick! πŸ”₯

πŸ’‘ Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:


.*\.google\.com

.*\.gstatic\.com

.*\.googleapis\.com

.*\.pki\.goog

.*\.mozilla\..*

If you have any other filters to do share, drop it on comments!
1❀15πŸ‘9
πŸ”–Search for leaked Api keys on πŸ“±github

⬇️Azure open AI
AZURE_OPENAI_API_KEY /[a-f0-9]{32}$/


⬇️Jira token
/ATATT3[a-zA-Z0-9_\-+=]{184,195}$/


#CyberSecurity #BugBounty #infosec #BugBountyTools #pentest #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4❀1
🐳10