Brut Security
14.7K subscribers
911 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
4. Status Code Manipulation
- If the response status code is 4XX, change it to 200 OK to bypass 2FA.

5. 2FA Code Reusability
- Request a 2FA code and use it. Then try reusing it or requesting multiple codes to check if previously requested codes expire.

6. CSRF on 2FA Disable Feature
- Request a 2FA code and use it. Then try reusing it or requesting multiple codes to check if previously requested codes expire.

7. Backup Code Abuse
- Use techniques like response/status code manipulation, brute-force, etc., to bypass backup codes and disable/reset 2FA.

8. Enabling 2FA Doesn't Expire Previous Session
- Log in to the application in two different browsers. Enable 2FA in one session. Use the other session to check if itโ€™s still active, which could be an issue.

9. 2FA Refer Check Bypass
- Directly navigate to the page after 2FA or any authenticated page. If it doesn't work, change the refer header to the 2FA page URL.

10. 2FA Code Leakage in Response
- Capture the request when 2FA code is triggered. Check the response to see if the 2FA code is leaked.

11. JS File Analysis
- Analyze all JS files referred in the response when triggering the 2FA code request to see if any contain information to bypass 2FA.

12. Lack of Brute-Force Protection
- Request 2FA codes repeatedly. If thereโ€™s no rate limit, itโ€™s a rate limit issue. Try brute-forcing the 2FA code.

13. Password Reset/Email Change - 2FA Disable
- Change the victim's email or password. 2FA might be disabled, depending on the organization's policy.

14. Missing 2FA Code Integrity Validation
- Use a valid 2FA code from your account in the victim's 2FA request to see if it bypasses 2FA protection.

15. Direct Request
- Directly navigate to the page after 2FA or any authenticated page. Change the refer header as if you came from the 2FA page.

16. Reusing Token
- Try reusing a previously used token inside the account to authenticate.

17. Sharing Unused Tokens
- Check if you can get a token from your account and use it to bypass 2FA in a different account.

18. Leaked Token
- Check if a token is leaked in the response from the web application.

19. Session Permission
- Use the same session to start the flow using your account and the victim's account. Complete 2FA with your account but try accessing the next step with the victim's account.

20. Password Reset Function
- Check if the password reset function logs the user in after completion. Try reusing the link to reset the password multiple times.

21. Lack of Rate Limit
- Check if thereโ€™s a limit on the number of codes you can try. Brute force if thereโ€™s no limit.

22. Flow Rate Limit but No Rate Limit
- If thereโ€™s a flow rate limit but no rate limit, you can brute force the code with enough time.

23. Re-send Code and Reset the Limit
- If24. Infinite OTP Regeneration
- If you can generate a new OTP infinitely and the OTP is simple enough (e.g., 4 numbers), you can try the same 4 or 5 tokens every time and generate OTPs until it matches.

24. Guessable Cookie
- If the "remember me" functionality uses a guessable code in a new cookie, try to guess it.

25. Guessable Cookie
- If the "remember me" functionality uses a guessable code in a new cookie, try to guess it.

26. IP Address
- If the "remember me" functionality is attached to your IP address, you can try to figure out the IP address of the victim and impersonate it using the X-Forwarded-For header.

27. Subdomains
- Check for "testing" subdomains with login functionality. They might not support 2FA or might have vulnerable versions of it.

28. APIs
- Look for APIs located under a
/v*/ directory. Older API endpoints might be vulnerable to 2FA bypass.

29. Previous Sessions
- When 2FA is enabled, previous sessions should be ended. If not, an attacker could hijack an active session
๐Ÿ‘10โค1
before 2FA.

30. Improper Access Control to Backup Codes
- If there are CORS misconfigurations or XSS vulnerabilities, backup codes can be stolen and used to bypass 2FA if the username and password are known.

31. Information Disclosure
- If confidential information, like the phone number, appears on the 2FA page that wasn't known previously, it's an information disclosure vulnerability.

32. Bypass 2FA with null or 000000
- Sometimes, 2FA can be bypassed by using null or 000000 as the code.

33. Previously Created Sessions Continue Being Valid After MFA Activation
- Access the same account on two devices. Enable 2FA on one device. If the session on the other device is still active, it's an issue.

34. Enable 2FA Without Verifying the Email
- Check if you can add 2FA to your account without verifying your email.

35. Password Not Checked When Disabling 2FA
- Try to disable 2FA without checking the password. If it succeeds, itโ€™s a vulnerability.

36. โ€œemailโ€ MFA Mode Allows Bypassing MFA From Victimโ€™s Device When Device Trust Is Not Expired
- Use tools like Burp Suite to intercept requests. Modify the fields to bypass 2FA using the "email" mode.
๐Ÿ”ฅ7๐Ÿ‘3โค1๐Ÿ—ฟ1
๐Ÿ—ฟ21๐Ÿณ2๐Ÿ”ฅ1
โšก๏ธuro - Using a URL list for security testing can be painful as there are a lot of URLs that have uninteresting/duplicate content; uro aims to solve that.

๐Ÿ”—github.com/s0md3v/uro
1โค6
๐Ÿš€ ๐๐ฎ๐  ๐๐จ๐ฎ๐ง๐ญ๐ฒ ๐’๐ญ๐š๐ซ๐ญ๐ž๐ซ ๐๐š๐œ๐ค ๐Ÿš€
๐–๐š๐ง๐ญ ๐š๐œ๐œ๐ž๐ฌ๐ฌ ๐ญ๐จ ๐๐ฎ๐  ๐๐จ๐ฎ๐ง๐ญ๐ฒ ๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฌ, ๐๐ฅ๐š๐ญ๐Ÿ๐จ๐ซ๐ฆ๐ฌ, ๐†๐ฎ๐ข๐๐ž๐ฌ, ๐๐จ๐จ๐ค๐ฌ, ๐š๐ง๐ ๐‘๐ž๐š๐ฅ ๐‘๐ž๐ฉ๐จ๐ซ๐ญ๐ฌ?

๐Ÿ‘‰Do Follow+โค๏ธLike+๐Ÿ”„Retweet+๐Ÿ’ฌDM "Bounty" on @brutsecurity_bot

#BugBounty #BugBountyTips
2โค26๐Ÿ‘3
โ˜„๏ธSQLMap Command Generatorโ˜„๏ธ

โš ๏ธhttps://acorzo1983.github.io/SQLMapCG/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘8๐Ÿ”ฅ8
๐Ÿ‘3
Brut Security pinned ยซ๐Ÿš€ ๐๐ฎ๐  ๐๐จ๐ฎ๐ง๐ญ๐ฒ ๐’๐ญ๐š๐ซ๐ญ๐ž๐ซ ๐๐š๐œ๐ค ๐Ÿš€ ๐–๐š๐ง๐ญ ๐š๐œ๐œ๐ž๐ฌ๐ฌ ๐ญ๐จ ๐๐ฎ๐  ๐๐จ๐ฎ๐ง๐ญ๐ฒ ๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฌ, ๐๐ฅ๐š๐ญ๐Ÿ๐จ๐ซ๐ฆ๐ฌ, ๐†๐ฎ๐ข๐๐ž๐ฌ, ๐๐จ๐จ๐ค๐ฌ, ๐š๐ง๐ ๐‘๐ž๐š๐ฅ ๐‘๐ž๐ฉ๐จ๐ซ๐ญ๐ฌ? ๐Ÿ‘‰Do Follow+โค๏ธLike+๐Ÿ”„Retweet+๐Ÿ’ฌDM "Bounty" on @brutsecurity_bot #BugBounty #BugBountyTipsยป
๐Ÿณ8๐Ÿ‘1๐Ÿ”ฅ1๐Ÿ—ฟ1
โ˜„๏ธYou can try this effective manual openredirect Bypassโ˜„๏ธ

1. Null-byte injection:
   - /
google.com%00/
   - //
google.com%00
 
2. Base64 encoding variations:
   - aHR0cDovL2dvb2dsZS5jb20=
   - aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbQ==
   - //base64:d3d3Lmdvb2dsZS5jb20=/
 
3. Case-sensitive variations:
   - //
GOOGLE.com/
   - //
GoOgLe.com/

4. Overlong UTF-8 sequences:
   - %C0%AE%C0%AE%2F (overlong encoding for ../)
   - %C0%AF%C0%AF%2F%
2Fgoogle.com

5. Mixed encoding schemes:
   - /%68%74%74%70://
google.com
   - //base64:%32%46%32%46%67%6F%6F%67%6C%65%2E%63%6F%6D
   - //base64:%2F%
2Fgoogle.com/

6. Alternative domain notations:
   - //
[email protected]/
   - //
127.0.0.1.xip.io/
   - //0x7F000001/ (hexadecimal IP)

7. Trailing special characters:
   - //
google.com/#/
   - //
google.com/;&/
   - //
google.com/?id=123&//

8. Octal IP address format:
   - https://0177.0.0.1/
   - https://00177.0000.0000.0001/

9. IP address variants:
   - https://3232235777 (decimal notation of an IP)
   - https://0xC0A80001 (hex notation of IP)
   -
https://192.168.1.1/

10. Path traversal with encoding:
    - /..%252f..%252f..%252fetc/passwd
    - /%252e%252e/%252e%252e/%252e%252e/etc/passwd
    - /..%5c..%5c..%5cwindows/system32/cmd.exe

11. Alternate protocol inclusion:
    -
ftp://google.com/
    - javascript:alert(1)//
google.com

12. Protocol-relative URLs:
    - :////
google.com/
    - :///
google.com/

13. Redirection edge cases:
    - //
google.com/?q=//bing.com/
    - //
google.com?q=https://another-site.com/

14. IPv6 notation:
    - https://[::1]/
    - https://[::ffff:
192.168.1.1]/
   
15. Double URL encoding:
    - %252f%
252fgoogle.com (encoded twice)
    - %
255cgoogle.com

16. Combined traversal & encoding:
    - /%2E%2E/%2E%2E/etc/passwd
    - /%2e%2e%5c%2e%2e/etc/passwd

17. Reverse DNS-based:
    -
https://google.com.reverselookup.com
    - //
lookup-reversed.google.com/

18. Non-standard ports:
    -
https://google.com:81/
    -
https://google.com:444/

19. Unicode obfuscation in paths:
    - /%E2%80%
8Egoogle.com/
    - /%C2%
A0google.com/

20. Query parameters obfuscation:
    - //
google.com/?q=https://another-site.com/
    - //
google.com/?redirect=https://google.com/

21. Using @ symbol for userinfo:
    -
https://admin:[email protected]/
    - https://
@google.com

22. Combination of userinfo and traversal:
    -
https://admin:[email protected]/../../etc/passwd
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค5๐Ÿ‘3๐Ÿ—ฟ1
๐Ÿ“Š ๐—ฃ๐—ผ๐—น๐—น ๐—ง๐—ถ๐—บ๐—ฒ: ๐—”๐—ฟ๐—ฒ ๐—ฌ๐—ผ๐˜‚ ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐˜† ๐—ณ๐—ผ๐—ฟ ๐—ฃ๐—ฟ๐—ผ ๐—Ÿ๐—ฎ๐—ฏ๐˜€? ๐Ÿ“Š

๐—›๐—ฒ๐˜† ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€! ๐Ÿ‘‹ ๐—Ÿ๐—ฒ๐˜โ€™๐˜€ ๐˜€๐—ฒ๐—ฒ ๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜†๐—ผ๐—ป๐—ฒ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐˜€ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐—ท๐—ผ๐˜‚๐—ฟ๐—ป๐—ฒ๐˜†! ๐—›๐—ฎ๐—ฐ๐—ธ ๐—ง๐—ต๐—ฒ ๐—•๐—ผ๐˜…โ€™๐˜€ ๐—ฃ๐—ฟ๐—ผ ๐—Ÿ๐—ฎ๐—ฏ๐˜€ ๐—ผ๐—ณ๐—ณ๐—ฒ๐—ฟ ๐—ฟ๐—ฒ๐—ฎ๐—น-๐˜„๐—ผ๐—ฟ๐—น๐—ฑ ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ฒ๐—ฎ๐—บ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐—ฒ๐—ป๐˜๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐˜€๐—ฒ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜๐˜€ โ€“ ๐—ฎ ๐—ฏ๐—ถ๐—ด ๐˜€๐˜๐—ฒ๐—ฝ ๐˜‚๐—ฝ ๐—ถ๐—ณ ๐˜†๐—ผ๐˜‚โ€™๐—ฟ๐—ฒ ๐—น๐—ผ๐—ผ๐—ธ๐—ถ๐—ป๐—ด ๐˜๐—ผ ๐˜๐—ฎ๐—ธ๐—ฒ ๐˜†๐—ผ๐˜‚๐—ฟ ๐˜€๐—ธ๐—ถ๐—น๐—น๐˜€ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—ป๐—ฒ๐˜…๐˜ ๐—น๐—ฒ๐˜ƒ๐—ฒ๐—น.

๐Ÿ” ๐—ฉ๐—ผ๐˜๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐˜€๐—ฒ๐—ฒ ๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ ๐˜†๐—ผ๐˜‚ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐˜†! #๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† #๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด #๐—ฃ๐—ฟ๐—ผ๐—Ÿ๐—ฎ๐—ฏ๐˜€ #๐—›๐—ฎ๐—ฐ๐—ธ๐—ง๐—ต๐—ฒ๐—•๐—ผ๐˜…
๐Ÿ‘11โค2
๐Ÿ‘‰ ๐—ช๐—ต๐—ถ๐—ฐ๐—ต ๐—ฏ๐—ฒ๐˜€๐˜ ๐—ฑ๐—ฒ๐˜€๐—ฐ๐—ฟ๐—ถ๐—ฏ๐—ฒ๐˜€ ๐˜†๐—ผ๐˜‚?
Anonymous Poll
45%
Beginner โ€“ Iโ€™m still learning the basics.
29%
Intermediate โ€“ Iโ€™m comfortable with CTFs and regular HTB labs.
18%
Advanced โ€“ Iโ€™m looking for real-world, red team experiences.
8%
Pro โ€“ Iโ€™m ready to dive into Pro Labs and tackle enterprise-level challenges!
๐ŸŽ‰ Unlock That 20% Pro Labs Discount! ๐ŸŽ‰

Alright, hackers, hereโ€™s the deal: Hack The Box Pro Labs just got REAL! ๐Ÿ’ฅ If youโ€™re ready to leave the beginner stuff in the dust and dive into legit red team missions, Iโ€™ve got an exclusive 20% off waiting for you. But hereโ€™s the catch โ€“ only 100 of you can snag this deal. ๐Ÿ‘€

๐Ÿ’ฅ Use code: brutsecurityprolabs20 at checkout for 20% off the annual Pro Labs subscription! Itโ€™s high-level hacking in real enterprise environments. Ready to go pro? ๐Ÿ•ถ๏ธ

๐Ÿ”—Checkout Here - https://hackthebox.com/hacker/pro-labs

Jump on this quick โ€“ or you might miss the boat. ๐Ÿšค๐Ÿ’จ #HackTheBox #LevelUp #ProLabs
โค2๐Ÿ”ฅ2๐Ÿ‘1๐Ÿ—ฟ1
Brut Security pinned ยซ๐ŸŽ‰ Unlock That 20% Pro Labs Discount! ๐ŸŽ‰ Alright, hackers, hereโ€™s the deal: Hack The Box Pro Labs just got REAL! ๐Ÿ’ฅ If youโ€™re ready to leave the beginner stuff in the dust and dive into legit red team missions, Iโ€™ve got an exclusive 20% off waiting for you.โ€ฆยป
@TheSecOpsGroup have dropped an incredible Black Friday deal โ€” 90% OFF on ALL pentesting exams with: no expiration dates, 3 different categories, and exams based on real-world scenarios!

Use Discount Code: BLACKFRIDAY-90
https://secops.group/pentesting-exams/
๐Ÿ”ฅ3๐Ÿ‘1
โ˜„๏ธ๐—”๐—ฐ๐—ฐ๐—ผ๐˜‚๐—ป๐˜ ๐—ง๐—ฎ๐—ธ๐—ฒ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—•๐˜‚๐—ด ๐—•๐—ผ๐˜‚๐—ป๐˜๐˜† ๐—ง๐—ถ๐—ฝ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ก๐—ฒ๐˜„ ๐—•๐˜‚๐—ด ๐—›๐˜‚๐—ป๐˜๐—ฒ๐—ฟ๐˜€โ˜„๏ธ

โš ๏ธSimplified Tips for Account Takeover (ATO)

1. Pre-Account Takeover
- How to Hunt:
- Register an email without verifying it.
- Register again using a different method (e.g., 'sign up with Google') with the same email.
- Check if the application links both accounts.
- Try logging in to see if you can access information from the other account.

2. Account Takeover due to Improper Rate Limiting
- How to Hunt:
- Capture the login request.
- Use tools like Burp Suite's Intruder to brute-force the login.
- Analyze the response and length to detect anomalies.

3. Account Takeover by Utilizing Sensitive Data Exposure
- How to Hunt:
- Pay attention to the request and response parts of the application.
- Look for exposed sensitive data like OTPs, hashes, or passwords.

4. Login Vulnerabilities
- Check for:
- Brute-force vulnerabilities.
- OAuth misconfigurations.
- OTP brute-forcing.
- JWT misconfigurations.
- SQL injection to bypass authentication.
- Proper validation of OTP or tokens.

5. Password Reset Vulnerabilities
- Check for:
- Brute-force vulnerabilities in password reset OTPs.
- Predictable tokens.
- JWT misconfigurations.
- IDOR vulnerabilities.
- Host header injection.
- Leaked tokens or OTPs in HTTP responses.
- Proper validation of OTP or tokens.
- HTTP parameter pollution (HPP).

6. XSS to Account Takeover
- How to Hunt:
- Try to exfiltrate cookies or auth tokens.
- Craft XSS payloads to change user email or password.

7. CSRF to Account Takeover
- Check for:
- Vulnerabilities in email update endpoints.
- Vulnerabilities in password change endpoints.

8. IDOR to Account Takeover
- Check for:

- Vulnerabilities in email update endpoints.
- Vulnerabilities in password change endpoints.
- Vulnerabilities in password reset endpoints.

9. Account Takeover by Response & Status Code Manipulation- How to Hunt:
- Look for vulnerabilities where manipulating response or status codes can lead to account takeover.

10. Account Takeover by Exploiting Weak Cryptography- Check for:
- Weak cryptographic implementations in password reset processes.

11. Password or Email Change Function- How to Hunt:
- If you see email parameters in password change requests, try changing your email to the victim's email.

12. Sign-Up Function- How to Hunt:
- Try signing up with the target email directly. - Use third-party sign-ups with phone numbers, then link the victim's email to your account.

13. Rest Token
- How to Hunt: - Try using your REST token with the target account.
- Brute 13. Rest Token- How to Hunt:
- Try using your REST token with the target account. - Brute force the REST token if it is numeric.
- Try to figure out how the tokens are generated. For example, check if they are generated based on timestamp, user ID, or email.

14. Host Header Injection- How to Hunt:
- Intercept the REST account request. - Change the Host header value from the target site to your own domain (e.g., `POST /PassRest HTTP/1.1 Host: Attacker.com`).

15. CORS Misconfiguration to Account Takeover
- How to Hunt: - Check if the application has CORS misconfigurations.
- If so, you might be able to steal sensitive information from the user to take over their account or make them change authentication information. - Refer to [CORS Bypass](https://book.hacktricks.xyz/pentesting-web/cors-bypass) for more details.

16. Account Takeover via Leaked Session Cookie
- How to Hunt: - Look for vulnerabilities where session cookies are leaked.
- Refer to [HackerOne Report 745324](https://hackerone.com/reports/745324) for more details.

17. HTTP Request Smuggling to ATO- How to Hunt:
- Look for HTTP request smuggling vulnerabilities.
- Refer to [HackerOne Reports 737140 and 740037](https://hackerone.com/reports/737140) and [HackerOne Report 740037](https://hackerone.com/reports/740037) for more details.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค11๐Ÿ‘5
18. Bypassing Digits Origin Validation Which Leads to Account Takeover- How to Hunt:
- Look for vulnerabilities where digits origin validation can be bypassed. - Refer to [HackerOne Report 129873](https://hackerone.com/reports/129873) for more details.

19. Top ATO Reports in HackerOne
- How to Hunt: - Review top account takeover reports in HackerOne.
- Refer to [TOP ACCOUNT TAKEOVER](https://github.com/reddelexc/hackerone-reports/blob/master/tops_by_bug_type/TOPACCOUNTTAKEOVER.md) for more details.
โค5
โšก๏ธA Simple Tip to Use Unlimited License in Sublime Textโšก๏ธ

1. Run HxD as Admin.
2. Open (Ctrl + O) and find "sublime_text.exe".
3. Search > Replace (Ctrl + R) > Hex values
4. Enter the following: Search for: 80 79 05 00 0F 94 C2 -> Replace with C6 41 05 01 B2 00 90 Search direction: All -> Replace All (only 1 instance found for me).
5. Save (Ctrl + S) then exit HxD.
6. Run Sublime Text.
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘7โค5๐Ÿ”ฅ2