Pre-Auth RCE CyberPanel 0day by Chirag Artani π₯
Useful video from our friend's channel about one of the freshest big vulnerabilities with Netlas search π
We also recommend checking out his website and Twitter for more tips:
π Site: 3rag.com
π Twitter: x.com/Chirag99Artani
Useful video from our friend's channel about one of the freshest big vulnerabilities with Netlas search π
We also recommend checking out his website and Twitter for more tips:
π Site: 3rag.com
π Twitter: x.com/Chirag99Artani
YouTube
Pre-Auth Remote Code Execution CyberPanel 0day | Live Recon Using Netlas
CyberPanel v2.3.6 has a critical vulnerability that allows remote attackers to execute arbitrary commands on the server without prior authentication.
Impact: Attackers can exploit this vulnerability by crafting malicious requests that bypass authenticationβ¦
Impact: Attackers can exploit this vulnerability by crafting malicious requests that bypass authenticationβ¦
π₯4β€3π1
π¨ Warning to All Members π¨
Brut Security is a professional community focused strictly on learning and discussing cybersecurity topics. Any personal questions about religion, race, or similar matters are strictly prohibited. We are here to learn and grow as ethical hackers, not to engage in discussions unrelated to cybersecurity.
Please adhere to these guidelines:
1. Keep all conversations focused on cybersecurity topics.
2. Avoid personal questions about membersβ religious or cultural backgrounds.
3. Show respect for all membersβthis is a safe, professional space.
Failure to follow these rules will lead to immediate removal from the group.
For Queries Related to Enrolment or Other Questions, Do Reach here @brutsecurity_bot
Brut Security is a professional community focused strictly on learning and discussing cybersecurity topics. Any personal questions about religion, race, or similar matters are strictly prohibited. We are here to learn and grow as ethical hackers, not to engage in discussions unrelated to cybersecurity.
Please adhere to these guidelines:
1. Keep all conversations focused on cybersecurity topics.
2. Avoid personal questions about membersβ religious or cultural backgrounds.
3. Show respect for all membersβthis is a safe, professional space.
Failure to follow these rules will lead to immediate removal from the group.
For Queries Related to Enrolment or Other Questions, Do Reach here @brutsecurity_bot
π₯12β€11π6
Happy Diwali to the Brut Security Community!
Wishing everyone a joyful and prosperous Diwali! May this festival of lights bring happiness, success, and new learning opportunities to all.
Whether youβre celebrating or just enjoying the festive spirit, let's continue to shine brightly together as a global community. Hereβs to knowledge, growth, and unity!
Stay safe, stay inspired, and Happy Diwali! πͺ
Wishing everyone a joyful and prosperous Diwali! May this festival of lights bring happiness, success, and new learning opportunities to all.
Whether youβre celebrating or just enjoying the festive spirit, let's continue to shine brightly together as a global community. Hereβs to knowledge, growth, and unity!
Stay safe, stay inspired, and Happy Diwali! πͺ
1β€15π2
CVE-2024-50550: Privilege Escalation in LiteSpeed Cache WP Plugin, 8.1 rating π₯
Weak security hash verification vulnerability allows an attacker to gain administrative privileges.
Search at Netlas.io:
π Link: https://nt.ls/A60iV
π Dork: http.body:"plugins/litespeed-cache"
Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
Weak security hash verification vulnerability allows an attacker to gain administrative privileges.
Search at Netlas.io:
π Link: https://nt.ls/A60iV
π Dork: http.body:"plugins/litespeed-cache"
Read more: https://patchstack.com/articles/rare-case-of-privilege-escalation-patched-in-litespeed-cache-plugin/
π3
Brut Security
Best Motivation Tip Ever
But Our Bro is Killing It ππ Happy Diwali and π
πΏ12π₯5π1π³1
CVE-2024-49768: Race Condition in Waitress Python server, 9.1 rating π₯
Due to an error, the server can process a request even if the connection should have been closed.
Search at Netlas.io:
π Link: https://nt.ls/VYS9t
π Dork: http.headers.server:"waitress"
Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
Due to an error, the server can process a request even if the connection should have been closed.
Search at Netlas.io:
π Link: https://nt.ls/VYS9t
π Dork: http.headers.server:"waitress"
Vendor's advisory: https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj
π2πΏ2
Setup and host your own blind XSS and SSRF testing tool for free https://github.com/Rahim7X/Argus.git
2π₯9π2
π‘οΈ List of Websites Giving Free RDP/VPS π₯οΈ
πΉ sadd.io π
πΈ vpswala.org π
πΉ ihor.ru π»
πΈ gratisvps.net π
πΉ ionos.com βοΈ
πΈ vultr.com βοΈ
πΉ skysilk.com π
πΈ yellowcircle.net π
πΉ apponfly.com/en π²
πΈ cloudsigma.com π
πΉ ezywatch.com/freevps πΉοΈ
πΈ digitalocean.com π³
πΉ ctl.io/free-trial π
πΈ developer.rackspace.com π οΈ
πΉ my.letscloud.io/sign-up β¨
πΈ ohosti.com/vpshosting.php π
πΉ neuprime.com/l_vds3.php π₯οΈ
π Note: Some websites may require π³ credit card verification for trial access.
πΉ sadd.io π
πΈ vpswala.org π
πΉ ihor.ru π»
πΈ gratisvps.net π
πΉ ionos.com βοΈ
πΈ vultr.com βοΈ
πΉ skysilk.com π
πΈ yellowcircle.net π
πΉ apponfly.com/en π²
πΈ cloudsigma.com π
πΉ ezywatch.com/freevps πΉοΈ
πΈ digitalocean.com π³
πΉ ctl.io/free-trial π
πΈ developer.rackspace.com π οΈ
πΉ my.letscloud.io/sign-up β¨
πΈ ohosti.com/vpshosting.php π
πΉ neuprime.com/l_vds3.php π₯οΈ
π Note: Some websites may require π³ credit card verification for trial access.
π13
Find sensitive files using Wayback
#bugbountytip #bugbounty #bugbountytips
waybackurls 123.com | grep - -color -E "1.xls | \\.tar.gz | \\.bak | \\.xml | \\.xlsx | \\.json | \\.rar | \\.pdf | \\.sql | \\.doc | \\.docx | \\.pptx | \\.txt | \\.zip | \\.tgz | \\.7z"
#bugbountytip #bugbounty #bugbountytips
1π13β€4π₯3
a XSS payload with Alert Obfuscation, for bypass Regex filter
#infosec #cybersec #bugbountytip
<img src="X" onerror=top[8680439..toString(30)](1337)>
<script>top[8680439..toString(30)](1337)</script>
#infosec #cybersec #bugbountytip
β€11π6
Reduce Noise in Burp Suite with This Simple Trick! π₯
π‘ Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
If you have any other filters to do share, drop it on comments!
π‘ Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\..*
If you have any other filters to do share, drop it on comments!
1β€15π9
AZURE_OPENAI_API_KEY /[a-f0-9]{32}$//ATATT3[a-zA-Z0-9_\-+=]{184,195}$/#CyberSecurity #BugBounty #infosec #BugBountyTools #pentest #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
π4β€1
Check for Subdomain Takeover Vulnerabilities
This enumerates subdomains and checks if they resolve. Subdomains that return NXDOMAIN may be vulnerable to takeover if they point to external services.
Replace nasa.gov with your target.
This enumerates subdomains and checks if they resolve. Subdomains that return NXDOMAIN may be vulnerable to takeover if they point to external services.
subfinder -d target.com -silent | while read sub; do host $sub; done | grep "NXDOMAIN"
Replace nasa.gov with your target.
π12πΏ6