Brut Security
14.7K subscribers
909 photos
73 videos
287 files
965 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โ˜„๏ธSQLMap Command Generatorโ˜„๏ธ

โš ๏ธhttps://acorzo1983.github.io/SQLMapCG/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘8๐Ÿ”ฅ8
๐Ÿ‘3
Brut Security pinned ยซ๐Ÿš€ ๐๐ฎ๐  ๐๐จ๐ฎ๐ง๐ญ๐ฒ ๐’๐ญ๐š๐ซ๐ญ๐ž๐ซ ๐๐š๐œ๐ค ๐Ÿš€ ๐–๐š๐ง๐ญ ๐š๐œ๐œ๐ž๐ฌ๐ฌ ๐ญ๐จ ๐๐ฎ๐  ๐๐จ๐ฎ๐ง๐ญ๐ฒ ๐๐ซ๐จ๐ ๐ซ๐š๐ฆ๐ฌ, ๐๐ฅ๐š๐ญ๐Ÿ๐จ๐ซ๐ฆ๐ฌ, ๐†๐ฎ๐ข๐๐ž๐ฌ, ๐๐จ๐จ๐ค๐ฌ, ๐š๐ง๐ ๐‘๐ž๐š๐ฅ ๐‘๐ž๐ฉ๐จ๐ซ๐ญ๐ฌ? ๐Ÿ‘‰Do Follow+โค๏ธLike+๐Ÿ”„Retweet+๐Ÿ’ฌDM "Bounty" on @brutsecurity_bot #BugBounty #BugBountyTipsยป
๐Ÿณ8๐Ÿ‘1๐Ÿ”ฅ1๐Ÿ—ฟ1
โ˜„๏ธYou can try this effective manual openredirect Bypassโ˜„๏ธ

1. Null-byte injection:
   - /
google.com%00/
   - //
google.com%00
 
2. Base64 encoding variations:
   - aHR0cDovL2dvb2dsZS5jb20=
   - aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbQ==
   - //base64:d3d3Lmdvb2dsZS5jb20=/
 
3. Case-sensitive variations:
   - //
GOOGLE.com/
   - //
GoOgLe.com/

4. Overlong UTF-8 sequences:
   - %C0%AE%C0%AE%2F (overlong encoding for ../)
   - %C0%AF%C0%AF%2F%
2Fgoogle.com

5. Mixed encoding schemes:
   - /%68%74%74%70://
google.com
   - //base64:%32%46%32%46%67%6F%6F%67%6C%65%2E%63%6F%6D
   - //base64:%2F%
2Fgoogle.com/

6. Alternative domain notations:
   - //
[email protected]/
   - //
127.0.0.1.xip.io/
   - //0x7F000001/ (hexadecimal IP)

7. Trailing special characters:
   - //
google.com/#/
   - //
google.com/;&/
   - //
google.com/?id=123&//

8. Octal IP address format:
   - https://0177.0.0.1/
   - https://00177.0000.0000.0001/

9. IP address variants:
   - https://3232235777 (decimal notation of an IP)
   - https://0xC0A80001 (hex notation of IP)
   -
https://192.168.1.1/

10. Path traversal with encoding:
    - /..%252f..%252f..%252fetc/passwd
    - /%252e%252e/%252e%252e/%252e%252e/etc/passwd
    - /..%5c..%5c..%5cwindows/system32/cmd.exe

11. Alternate protocol inclusion:
    -
ftp://google.com/
    - javascript:alert(1)//
google.com

12. Protocol-relative URLs:
    - :////
google.com/
    - :///
google.com/

13. Redirection edge cases:
    - //
google.com/?q=//bing.com/
    - //
google.com?q=https://another-site.com/

14. IPv6 notation:
    - https://[::1]/
    - https://[::ffff:
192.168.1.1]/
   
15. Double URL encoding:
    - %252f%
252fgoogle.com (encoded twice)
    - %
255cgoogle.com

16. Combined traversal & encoding:
    - /%2E%2E/%2E%2E/etc/passwd
    - /%2e%2e%5c%2e%2e/etc/passwd

17. Reverse DNS-based:
    -
https://google.com.reverselookup.com
    - //
lookup-reversed.google.com/

18. Non-standard ports:
    -
https://google.com:81/
    -
https://google.com:444/

19. Unicode obfuscation in paths:
    - /%E2%80%
8Egoogle.com/
    - /%C2%
A0google.com/

20. Query parameters obfuscation:
    - //
google.com/?q=https://another-site.com/
    - //
google.com/?redirect=https://google.com/

21. Using @ symbol for userinfo:
    -
https://admin:[email protected]/
    - https://
@google.com

22. Combination of userinfo and traversal:
    -
https://admin:[email protected]/../../etc/passwd
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค5๐Ÿ‘3๐Ÿ—ฟ1
๐Ÿ“Š ๐—ฃ๐—ผ๐—น๐—น ๐—ง๐—ถ๐—บ๐—ฒ: ๐—”๐—ฟ๐—ฒ ๐—ฌ๐—ผ๐˜‚ ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐˜† ๐—ณ๐—ผ๐—ฟ ๐—ฃ๐—ฟ๐—ผ ๐—Ÿ๐—ฎ๐—ฏ๐˜€? ๐Ÿ“Š

๐—›๐—ฒ๐˜† ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ๐˜€! ๐Ÿ‘‹ ๐—Ÿ๐—ฒ๐˜โ€™๐˜€ ๐˜€๐—ฒ๐—ฒ ๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜†๐—ผ๐—ป๐—ฒ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐˜€ ๐—ถ๐—ป ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ต๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐—ท๐—ผ๐˜‚๐—ฟ๐—ป๐—ฒ๐˜†! ๐—›๐—ฎ๐—ฐ๐—ธ ๐—ง๐—ต๐—ฒ ๐—•๐—ผ๐˜…โ€™๐˜€ ๐—ฃ๐—ฟ๐—ผ ๐—Ÿ๐—ฎ๐—ฏ๐˜€ ๐—ผ๐—ณ๐—ณ๐—ฒ๐—ฟ ๐—ฟ๐—ฒ๐—ฎ๐—น-๐˜„๐—ผ๐—ฟ๐—น๐—ฑ ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ฒ๐—ฎ๐—บ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐—ฒ๐—ป๐˜๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐˜€๐—ฒ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜๐˜€ โ€“ ๐—ฎ ๐—ฏ๐—ถ๐—ด ๐˜€๐˜๐—ฒ๐—ฝ ๐˜‚๐—ฝ ๐—ถ๐—ณ ๐˜†๐—ผ๐˜‚โ€™๐—ฟ๐—ฒ ๐—น๐—ผ๐—ผ๐—ธ๐—ถ๐—ป๐—ด ๐˜๐—ผ ๐˜๐—ฎ๐—ธ๐—ฒ ๐˜†๐—ผ๐˜‚๐—ฟ ๐˜€๐—ธ๐—ถ๐—น๐—น๐˜€ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—ป๐—ฒ๐˜…๐˜ ๐—น๐—ฒ๐˜ƒ๐—ฒ๐—น.

๐Ÿ” ๐—ฉ๐—ผ๐˜๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐˜€๐—ฒ๐—ฒ ๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ ๐˜†๐—ผ๐˜‚ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐˜†! #๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† #๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด #๐—ฃ๐—ฟ๐—ผ๐—Ÿ๐—ฎ๐—ฏ๐˜€ #๐—›๐—ฎ๐—ฐ๐—ธ๐—ง๐—ต๐—ฒ๐—•๐—ผ๐˜…
๐Ÿ‘11โค2
๐Ÿ‘‰ ๐—ช๐—ต๐—ถ๐—ฐ๐—ต ๐—ฏ๐—ฒ๐˜€๐˜ ๐—ฑ๐—ฒ๐˜€๐—ฐ๐—ฟ๐—ถ๐—ฏ๐—ฒ๐˜€ ๐˜†๐—ผ๐˜‚?
Anonymous Poll
45%
Beginner โ€“ Iโ€™m still learning the basics.
29%
Intermediate โ€“ Iโ€™m comfortable with CTFs and regular HTB labs.
18%
Advanced โ€“ Iโ€™m looking for real-world, red team experiences.
8%
Pro โ€“ Iโ€™m ready to dive into Pro Labs and tackle enterprise-level challenges!
๐ŸŽ‰ Unlock That 20% Pro Labs Discount! ๐ŸŽ‰

Alright, hackers, hereโ€™s the deal: Hack The Box Pro Labs just got REAL! ๐Ÿ’ฅ If youโ€™re ready to leave the beginner stuff in the dust and dive into legit red team missions, Iโ€™ve got an exclusive 20% off waiting for you. But hereโ€™s the catch โ€“ only 100 of you can snag this deal. ๐Ÿ‘€

๐Ÿ’ฅ Use code: brutsecurityprolabs20 at checkout for 20% off the annual Pro Labs subscription! Itโ€™s high-level hacking in real enterprise environments. Ready to go pro? ๐Ÿ•ถ๏ธ

๐Ÿ”—Checkout Here - https://hackthebox.com/hacker/pro-labs

Jump on this quick โ€“ or you might miss the boat. ๐Ÿšค๐Ÿ’จ #HackTheBox #LevelUp #ProLabs
โค2๐Ÿ”ฅ2๐Ÿ‘1๐Ÿ—ฟ1
Brut Security pinned ยซ๐ŸŽ‰ Unlock That 20% Pro Labs Discount! ๐ŸŽ‰ Alright, hackers, hereโ€™s the deal: Hack The Box Pro Labs just got REAL! ๐Ÿ’ฅ If youโ€™re ready to leave the beginner stuff in the dust and dive into legit red team missions, Iโ€™ve got an exclusive 20% off waiting for you.โ€ฆยป
@TheSecOpsGroup have dropped an incredible Black Friday deal โ€” 90% OFF on ALL pentesting exams with: no expiration dates, 3 different categories, and exams based on real-world scenarios!

Use Discount Code: BLACKFRIDAY-90
https://secops.group/pentesting-exams/
๐Ÿ”ฅ3๐Ÿ‘1
โ˜„๏ธ๐—”๐—ฐ๐—ฐ๐—ผ๐˜‚๐—ป๐˜ ๐—ง๐—ฎ๐—ธ๐—ฒ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—•๐˜‚๐—ด ๐—•๐—ผ๐˜‚๐—ป๐˜๐˜† ๐—ง๐—ถ๐—ฝ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ก๐—ฒ๐˜„ ๐—•๐˜‚๐—ด ๐—›๐˜‚๐—ป๐˜๐—ฒ๐—ฟ๐˜€โ˜„๏ธ

โš ๏ธSimplified Tips for Account Takeover (ATO)

1. Pre-Account Takeover
- How to Hunt:
- Register an email without verifying it.
- Register again using a different method (e.g., 'sign up with Google') with the same email.
- Check if the application links both accounts.
- Try logging in to see if you can access information from the other account.

2. Account Takeover due to Improper Rate Limiting
- How to Hunt:
- Capture the login request.
- Use tools like Burp Suite's Intruder to brute-force the login.
- Analyze the response and length to detect anomalies.

3. Account Takeover by Utilizing Sensitive Data Exposure
- How to Hunt:
- Pay attention to the request and response parts of the application.
- Look for exposed sensitive data like OTPs, hashes, or passwords.

4. Login Vulnerabilities
- Check for:
- Brute-force vulnerabilities.
- OAuth misconfigurations.
- OTP brute-forcing.
- JWT misconfigurations.
- SQL injection to bypass authentication.
- Proper validation of OTP or tokens.

5. Password Reset Vulnerabilities
- Check for:
- Brute-force vulnerabilities in password reset OTPs.
- Predictable tokens.
- JWT misconfigurations.
- IDOR vulnerabilities.
- Host header injection.
- Leaked tokens or OTPs in HTTP responses.
- Proper validation of OTP or tokens.
- HTTP parameter pollution (HPP).

6. XSS to Account Takeover
- How to Hunt:
- Try to exfiltrate cookies or auth tokens.
- Craft XSS payloads to change user email or password.

7. CSRF to Account Takeover
- Check for:
- Vulnerabilities in email update endpoints.
- Vulnerabilities in password change endpoints.

8. IDOR to Account Takeover
- Check for:

- Vulnerabilities in email update endpoints.
- Vulnerabilities in password change endpoints.
- Vulnerabilities in password reset endpoints.

9. Account Takeover by Response & Status Code Manipulation- How to Hunt:
- Look for vulnerabilities where manipulating response or status codes can lead to account takeover.

10. Account Takeover by Exploiting Weak Cryptography- Check for:
- Weak cryptographic implementations in password reset processes.

11. Password or Email Change Function- How to Hunt:
- If you see email parameters in password change requests, try changing your email to the victim's email.

12. Sign-Up Function- How to Hunt:
- Try signing up with the target email directly. - Use third-party sign-ups with phone numbers, then link the victim's email to your account.

13. Rest Token
- How to Hunt: - Try using your REST token with the target account.
- Brute 13. Rest Token- How to Hunt:
- Try using your REST token with the target account. - Brute force the REST token if it is numeric.
- Try to figure out how the tokens are generated. For example, check if they are generated based on timestamp, user ID, or email.

14. Host Header Injection- How to Hunt:
- Intercept the REST account request. - Change the Host header value from the target site to your own domain (e.g., `POST /PassRest HTTP/1.1 Host: Attacker.com`).

15. CORS Misconfiguration to Account Takeover
- How to Hunt: - Check if the application has CORS misconfigurations.
- If so, you might be able to steal sensitive information from the user to take over their account or make them change authentication information. - Refer to [CORS Bypass](https://book.hacktricks.xyz/pentesting-web/cors-bypass) for more details.

16. Account Takeover via Leaked Session Cookie
- How to Hunt: - Look for vulnerabilities where session cookies are leaked.
- Refer to [HackerOne Report 745324](https://hackerone.com/reports/745324) for more details.

17. HTTP Request Smuggling to ATO- How to Hunt:
- Look for HTTP request smuggling vulnerabilities.
- Refer to [HackerOne Reports 737140 and 740037](https://hackerone.com/reports/737140) and [HackerOne Report 740037](https://hackerone.com/reports/740037) for more details.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค11๐Ÿ‘5
18. Bypassing Digits Origin Validation Which Leads to Account Takeover- How to Hunt:
- Look for vulnerabilities where digits origin validation can be bypassed. - Refer to [HackerOne Report 129873](https://hackerone.com/reports/129873) for more details.

19. Top ATO Reports in HackerOne
- How to Hunt: - Review top account takeover reports in HackerOne.
- Refer to [TOP ACCOUNT TAKEOVER](https://github.com/reddelexc/hackerone-reports/blob/master/tops_by_bug_type/TOPACCOUNTTAKEOVER.md) for more details.
โค5
โšก๏ธA Simple Tip to Use Unlimited License in Sublime Textโšก๏ธ

1. Run HxD as Admin.
2. Open (Ctrl + O) and find "sublime_text.exe".
3. Search > Replace (Ctrl + R) > Hex values
4. Enter the following: Search for: 80 79 05 00 0F 94 C2 -> Replace with C6 41 05 01 B2 00 90 Search direction: All -> Replace All (only 1 instance found for me).
5. Save (Ctrl + S) then exit HxD.
6. Run Sublime Text.
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘7โค5๐Ÿ”ฅ2
โค5๐Ÿ‘1
๐Ÿ”–Google #Dorks for #XSS

site:*.host.com ext:asp
site:*.host.com ext:jsp
site:*.host.com ext:aspx
site:*.host.com ext:jspx
site:*.host.com ext:do
site:*.host.com ext:action
site:*.host.com ext:php


๐Ÿ’กTip: These extensions are crucial; you can identify them from the results of crawled URLs and use them to search for vulnerabilities.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค9๐Ÿ‘4๐Ÿ”ฅ1
CVE-2024-52301: Improper Input Validation in Laravel Framework, 8.7 ratingโ—๏ธ

The vulnerability allows an attacker to change environment using a special crafted query string.

More then 830k instances at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/CDJgv
๐Ÿ‘‰ Dork: http.headers.set_cookie:"laravel_session="

Vendor's advisory: https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h
โค3๐Ÿ‘3๐Ÿ”ฅ1
Book_of_tips_by_aditya_shende.pdf
1.6 MB
๐Ÿ‘5โค2๐Ÿ”ฅ1๐Ÿ—ฟ1
Hey everyone! ๐ŸŽ‰

A big, warm welcome to all our new members! ๐Ÿ’• And to our amazing long-time supporters, thank you for sticking around and making this community what it is today! ๐Ÿ™Œ

If youโ€™ve been finding value in the bug bounty updates, cybersecurity tips, and job opportunities I share, Iโ€™d truly appreciate your support. โญ You can boost or give a star to
Brut Securityโ€”it keeps me motivated to keep delivering the best content for you all! ๐Ÿ’ป๐Ÿ”’

Thanks for being such an incredible community. Your encouragement means everything!
โค๏ธ ๐Ÿ’Ÿ
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค9๐Ÿ”ฅ2