Brut Security
14.7K subscribers
917 photos
73 videos
287 files
971 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
CVE-2024-52052, -053, -054, -055, -056: Multiple vulnerabilitites in Wowza Streaming Engine, 5.1 - 9.4 rating ๐Ÿ”ฅ

Five recent vulnerabilities we almost missed. RCE, stored XSS, file read, file write, and folder deletion - vulnerabilities for every taste!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/8BudC
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:3641ed4d68a0362f1ef45069584a71b0940acfcdb6abf8c13b8fc29837160a81 OR http.headers.server:"WowzaStreamingEngine"

Read more: https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/
๐Ÿ‘1
A bug bounty hunting journey.pdf
1.3 MB
A bug bounty hunting journey
๐Ÿ‘2โค1
Advanced Web Hacking.pdf
10.2 MB
NotSoSecure Advanced Web Hacking
๐Ÿ”ฅ11โค2๐Ÿ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”–How to find the manifest.json file of any Chrome extension:

1. Go to chrome://extensions
2. Turn on Developer mode
3. Copy the extension ID
4. Go to ~/Library/Application Support/Google/Chrome/Default/Extensions
5. Find the matching ID then find the manifest.json file!
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘7
CVE-2024-8932, -8929, -11233, -11236, -11234: Multiple vulnerabilities in PHP, 4.8 - 9.8 rating ๐Ÿ”ฅ

Five vulnerabilities in some PHP versions, which allowing attackers to leak sensitive information, execute arbitrary code, or launch DoS attacks.

More then 700k instances at Netlas.io:
๐Ÿ‘‰ Link 1 (tag, more precisely): https://nt.ls/yIHH8
๐Ÿ‘‰ Dork: tag.php.version:(>=8.1.0 AND <8.1.31) OR tag.php.version:(>=8.2.0 AND <8.2.26) OR tag.php.version:(>=8.3.0 AND <8.3.14)

๐Ÿ‘‰ Link 2 (not tag, all PHP instances): https://nt.ls/9GJlg
๐Ÿ‘‰ Dork: http.headers.x_powered_by:"php" OR http.headers.set_cookie:"PHPSESSID" OR http.headers.server:"PHP"

Vendor's advisories: https://github.com/php/php-src/security
๐Ÿ‘3โค2
Black Friday & Cyber Monday Discount at Netlas ๐ŸŽ‰

Take advantage of our exclusive Black Friday & Cyber Monday deal: 20% off Freelancer and Business subscriptions for both monthly and annual billing cycles!

The best part? This isnโ€™t just a one-time discount โ€“ itโ€™s your forever price as long as your subscription remains active or until base prices are reconsidered ๐Ÿ”ฅ

All you need to claim your forever discount is the code: BFCM2024.

๐Ÿ‘‰ Learn more here: https://nt.ls/2WiQ0
๐Ÿ‘2โค1๐Ÿณ1
CyberWarFare Labs is offering 90% OFF for some of its certifications, perfect especially for those looking for their first certification or to improve your skills. I highly recommend it, especially if you want an affordable option for certifications.

#NotAPaidPromotion
๐Ÿ‘4
๐Ÿ˜น๐Ÿ˜น๐Ÿ˜น
๐Ÿณ8๐Ÿ—ฟ4๐Ÿ‘3โค1
๐Ÿ”–The 4M #Methodology for Choosing the Right Bug Bounty Programs to #Hunt On: [Cross-Applying Finance to Bug Bounties]

๐Ÿ“ฑ Notion: ๐Ÿ”—Link
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘4
๐Ÿณ4๐Ÿ‘2
CVE-2024-11667: Directory Traversal in Zyxel Firewalls, 7.3 ratingโ—๏ธ

A vulnerability in the web interface of some firewalls allows an attacker to download or upload files using a special URL.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/agozE
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:9a02f3cf948f9409c25070f2f057b69dda5d0aaf7fa8d056552e8bda8295ca1f

Vendor's advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-27-2024
๐Ÿ‘9โค1๐Ÿ—ฟ1
โ˜„๏ธURL scrapper from AlienVault

โšก๏ธThe script utilizes the AlienVault OTX API to query URLs linked to the specified domain and saves the results in a structured format for further analysis.

๐Ÿ”— https://github.com/Suryesh/OTX_AlienVault_URL
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘3๐Ÿ”ฅ2โค1
This media is not supported in your browser
VIEW IN TELEGRAM
โ€œItโ€™s the 1st of December Again!โ€

Another year is slipping by, but guess what? Thereโ€™s still a whole month left to make it count. For all the bug hunters out there, this is your sign to look back and appreciate how far youโ€™ve comeโ€”and to push even harder.

Remember that first bounty? That late-night rush when you cracked a tough challenge? The time you got that โ€œValid Vulnerabilityโ€ email that made the sleepless nights worth it?

Bug bounty is a journey. Itโ€™s a grind, a game of patience, persistence, and passion. Itโ€™s about falling in love with the processโ€”of learning, breaking, fixing, and growing.

If youโ€™re stuck or frustrated, donโ€™t let it define you. Learn from your misses, keep reading, practicing, and hunting. The next breakthrough might be just a scan, payload, or overlooked endpoint away.

December is the perfect month to reflect and refocus. Write those reports, finish that pending recon, or master a new skill. Close the year knowing you gave it your all.

Letโ€™s finish this year strong, hunters. The worldโ€™s full of bugs waiting to be squashedโ€”and the next one could be yours.

โœˆ๏ธBrutSecurity
#KeepHunting #BugBountyLife #1stDecemberMomentum
2๐Ÿ‘14โค5๐Ÿ—ฟ3
Exploit AWS metadata & user data access in Bug Bounty & CTF challenges!

๐Ÿ”— https://github.com/Lu3ky13/Unauthorized-Access-to-Metadata-and-User-Data-like-CTF

#BugBounty #bugbountytip
๐Ÿ‘9
๐Ÿ”–Ex-param - an automated tool designed for finding reflected parameters for XSS vulnerabilities

โœ…
https://github.com/rootDR/ex-param
โค7๐Ÿ‘3๐Ÿ—ฟ1
JavaScript for Hackers.pdf
987.7 KB
JavaScript for Hackers by JOAS ANTONIO
๐Ÿ‘6โค2
This media is not supported in your browser
VIEW IN TELEGRAM
โ˜„๏ธParamScan is a simple Chrome extension for web security enthusiasts and pen testers. It helps you find URL parameters in a webpage's source code and check if any of them are reflected on the page. This is super useful for spotting potential XSS vulnerabilities and other security issues.

๐Ÿ”–https://github.com/ch1y0w0/ParamScan
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ14๐Ÿ‘6โค5๐Ÿคจ1