Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
▢️All the deals for InfoSec related software/tools this Black Friday!
https://github.com/0x90n/InfoSec-Black-Friday
https://saasfridaydeals.com/
https://indiegoodies.com/blackfriday
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯4
πŸ”–AWS penetration testing: A step-by-step Guide for Beginners

β˜„οΈhttps://www.hackthebox.com/blog/aws-pentesting-guide
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
❀8πŸ‘1
BGPView for Reconnaissance

- Get ASN Information

curl -s "https://api.bgpview.io/asn/AS12345" | jq


- Enumerate IP Prefixes for an ASN


curl -s "https://api.bgpview.io/asn/AS12345/prefixes" | jq '.data.ipv4_prefixes[] | .prefix'


- Retrieve IP Address Details


curl -s "https://api.bgpview.io/ip/8.8.8.8" | jq


- Search ASN, IP, or Domain Together


curl -s "https://api.bgpview.io/search?query=example.com" | jq '.data'


- Upstreams


curl -s "https://api.bgpview.io/asn/AS12345/upstreams" | jq


- Upstreams [ IPv4 ]


curl -s "https://api.bgpview.io/asn/AS12345/upstreams" | jq '.data.ipv4_upstreams[] | {asn, name, description, country: .country_code}'


- Upstreams [ IPv6 ]


curl -s "https://api.bgpview.io/asn/AS12345/upstreams" | jq '.data.ipv6_upstreams[] | {asn, name, description, country: .country_code}'


- All Peers


curl -s "https://api.bgpview.io/asn/AS12345/peers" | jq '[.data.ipv4_peers[], .data.ipv6_peers[]] | map({asn, name, description, country: .country_code})'


- Extract ASN Prefixes with Peer Details


curl -s "https://api.bgpview.io/asn/AS12345/peers" | jq '[.data.ipv4_peers[], .data.ipv6_peers[]] | map({asn, name, description, country: .country_code, prefix: .prefix})'


- Downstreams


curl -s "https://api.bgpview.io/asn/AS12345/downstreams" | jq


- Subdomain Enumeration from ASN


curl -s "https://api.bgpview.io/asn/AS12345/prefixes"
dig -x $prefix
done


- Query ASN by Organization Name


curl -s "https://api.bgpview.io/search?query=google" | jq '.data.asns[] | {asn, name, description}'



Β©Yasin
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘12🐳4❀2
BUG BOUNTY
πŸ‘13❀1
CVE-2024-52052, -053, -054, -055, -056: Multiple vulnerabilitites in Wowza Streaming Engine, 5.1 - 9.4 rating πŸ”₯

Five recent vulnerabilities we almost missed. RCE, stored XSS, file read, file write, and folder deletion - vulnerabilities for every taste!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/8BudC
πŸ‘‰ Dork: http.favicon.hash_sha256:3641ed4d68a0362f1ef45069584a71b0940acfcdb6abf8c13b8fc29837160a81 OR http.headers.server:"WowzaStreamingEngine"

Read more: https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/
πŸ‘1
A bug bounty hunting journey.pdf
1.3 MB
A bug bounty hunting journey
πŸ‘2❀1
Advanced Web Hacking.pdf
10.2 MB
NotSoSecure Advanced Web Hacking
πŸ”₯11❀2πŸ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”–How to find the manifest.json file of any Chrome extension:

1. Go to chrome://extensions
2. Turn on Developer mode
3. Copy the extension ID
4. Go to ~/Library/Application Support/Google/Chrome/Default/Extensions
5. Find the matching ID then find the manifest.json file!
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘7
CVE-2024-8932, -8929, -11233, -11236, -11234: Multiple vulnerabilities in PHP, 4.8 - 9.8 rating πŸ”₯

Five vulnerabilities in some PHP versions, which allowing attackers to leak sensitive information, execute arbitrary code, or launch DoS attacks.

More then 700k instances at Netlas.io:
πŸ‘‰ Link 1 (tag, more precisely): https://nt.ls/yIHH8
πŸ‘‰ Dork: tag.php.version:(>=8.1.0 AND <8.1.31) OR tag.php.version:(>=8.2.0 AND <8.2.26) OR tag.php.version:(>=8.3.0 AND <8.3.14)

πŸ‘‰ Link 2 (not tag, all PHP instances): https://nt.ls/9GJlg
πŸ‘‰ Dork: http.headers.x_powered_by:"php" OR http.headers.set_cookie:"PHPSESSID" OR http.headers.server:"PHP"

Vendor's advisories: https://github.com/php/php-src/security
πŸ‘3❀2
Black Friday & Cyber Monday Discount at Netlas πŸŽ‰

Take advantage of our exclusive Black Friday & Cyber Monday deal: 20% off Freelancer and Business subscriptions for both monthly and annual billing cycles!

The best part? This isn’t just a one-time discount – it’s your forever price as long as your subscription remains active or until base prices are reconsidered πŸ”₯

All you need to claim your forever discount is the code: BFCM2024.

πŸ‘‰ Learn more here: https://nt.ls/2WiQ0
πŸ‘2❀1🐳1
CyberWarFare Labs is offering 90% OFF for some of its certifications, perfect especially for those looking for their first certification or to improve your skills. I highly recommend it, especially if you want an affordable option for certifications.

#NotAPaidPromotion
πŸ‘4
😹😹😹
🐳8πŸ—Ώ4πŸ‘3❀1
πŸ”–The 4M #Methodology for Choosing the Right Bug Bounty Programs to #Hunt On: [Cross-Applying Finance to Bug Bounties]

πŸ“± Notion: πŸ”—Link
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4
🐳4πŸ‘2
CVE-2024-11667: Directory Traversal in Zyxel Firewalls, 7.3 rating❗️

A vulnerability in the web interface of some firewalls allows an attacker to download or upload files using a special URL.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/agozE
πŸ‘‰ Dork: http.favicon.hash_sha256:9a02f3cf948f9409c25070f2f057b69dda5d0aaf7fa8d056552e8bda8295ca1f

Vendor's advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-27-2024
πŸ‘9❀1πŸ—Ώ1
β˜„οΈURL scrapper from AlienVault

⚑️The script utilizes the AlienVault OTX API to query URLs linked to the specified domain and saves the results in a structured format for further analysis.

πŸ”— https://github.com/Suryesh/OTX_AlienVault_URL
Please open Telegram to view this post
VIEW IN TELEGRAM
1πŸ‘3πŸ”₯2❀1