Brut Security
14.8K subscribers
921 photos
73 videos
287 files
977 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
⚑Broken Access Control to Mass Account Takeover.
πŸ”₯11❀2πŸ‘1
❀10
⚑️Tiny-XSS-Payloads - A collection of tiny XSS Payloads that can be used in different contexts.

βœ…tinyxss.terjanq.me

#xss #BugBounty #CyberSecurity
πŸ‘11
⚑You can use #httpx to request any path and see the status code and other details on the go, filter, or matcher flags if you want to be more specific.

βœ…httpx -path /swagger-api/ -status-code -content-length
πŸ‘16πŸ”₯6❀1
Fuxploider: a free tool for finding and exploiting flaws in file upload forms. It spots allowed file types and finds out the best way to upload malicious files onto a website.

https://t.co/uP1HxJIdpC
❀7πŸ‘4
Thanks Everyone To Grow Our Community So Big <3

#telemetrio2024 #brutsecurity
πŸ”₯7πŸ‘3❀2πŸ‘¨β€πŸ’»2🀝2🐳1
Using theHarvester with the Netlas Module πŸ”

In our latest article, we demonstrate how to leverage the theHarvester framework integrated with Netlas to efficiently discover subdomains.

πŸ‘‰ Read now: https://netlas.io/blog/theharvester_and_netlas/
❀5πŸ‘3
πŸ”– Free Tool for Finding Open S3 Buckets and Files

🎯 Purpose:Search for open Amazon S3 buckets and locate potentially interesting files efficiently.

βœ… Tool Links:
Explore Open S3 Buckets: https://buckets.grayhatwarfare.com

πŸ“Œ Why This is Useful:Helps identify misconfigured S3 buckets.
Uncover sensitive data or files accidentally exposed to the public.
❀10πŸ‘3πŸ”₯2
πŸŽ‰ Happy New Year, Brut Fam! πŸŽ‰

2024 was incredibleβ€”together, we shared 1,500+ resources and grew to an 8.5K+ community! Your support makes it all worthwhile.
πŸ’ͺ
If you’ve found value in this journey, you can support me with a β˜•:
https://buymeacoffee.com/brutsecurity

Wishing you a safe, successful, and prosperous 2025! Let’s make it even bigger and better! πŸš€
❀14πŸ”₯3🀝1
⚑️SqliSniper: Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers

βœ…https://github.com/danialhalo/SqliSniper
πŸ‘8❀5
πŸ””Brut Practical Bug Bounty Training

❀Master Bug Bounty Hunting with Harsh D Ranjan
Learn from a proven bug hunter with extensive experience on platforms like Bugcrowd, HackerOne, and Immunefi.

⭐About the Trainer

Harsh D Ranjan is a recognized expert in bug bounty programs with verified profiles:
β€’ Bugcrowd
β€’ HackerOne
β€’ Immunefi

🌟Training Highlights
β€’ In-depth exploration of bug bounty methodologies
β€’ Practical guidance for platforms like Bugcrowd, HackerOne, and Immunefi
β€’ Real-world examples of impactful vulnerability reports
β€’ Hands-on practice to prepare you for live bug bounty programs

πŸ”΅Details

πŸ•’ Class Timings: Tuesday & Wednesday, 3:00–5:00 PM IST
πŸ“† Duration: 2–3 months
πŸ‘₯ Max Slots: 10 participants per batch
πŸ“ž DM on WhatsApp to Book Your Slot: https://wa.link/7j7p6g

🚫Why Enroll?
β€’ Direct mentorship from an experienced bug hunter
β€’ Small class size for personalized attention
β€’ Gain skills for earning through bug bounty programs

⚑Limited slots available! Sign up now to secure your spot.
Please open Telegram to view this post
VIEW IN TELEGRAM
1πŸ”₯5❀1πŸ‘1πŸ—Ώ1
Forwarded from Brut Security (Saumadip Mandal)
bounty_tips_100+.pdf
18.3 MB
❀10
⚑️Want to download 100+ Bug Bounty Tips collected from X?

βœ…Download the PDF from here - https://t.iss.one/brutsecurity/767

#BugBounty #bugbountytips
πŸ‘7πŸ”₯3
⚑️GoSearch - OSINT tool for searching people's digital footprint and leaked passwords across various social networks, written in Go.

βœ…https://github.com/ibnaleem/gosearch

#bugbounty #bugbountytips #cybersecurity
πŸ‘8❀4πŸ”₯2
πŸ‘3
πŸ”– On-Site Request Forgery (OSRF): An Overview

🚨On-Site Request Forgery (OSRF) is a lesser-known but impactful vulnerability similar to Cross-Site Request Forgery (CSRF). While both involve unauthorized actions performed on behalf of an authenticated user, the fundamental distinction lies in the request origin.

- CSRF: The attacker initiates requests from their controlled domain to exploit a victim's authenticated session.
- OSRF: The requests originate from the vulnerable application itself, and the attacker controls where the requests are directed.

---

πŸ” Where to Find OSRF Vulnerabilities

1. Reflected Inputs in
src Attributes
Look for inputs that can be reflected in attributes like
src. Example vulnerable tags:
html 
<img src="OUR_INPUT_HERE">
<video width="400" height="200" controls src="OUR_INPUT_HERE">
<audio src="OUR_INPUT_HERE">
<iframe src="OUR_INPUT_HERE">


πŸ‘‰ If the input can be manipulated, it may allow the attacker to direct requests to their desired endpoints.

2. Sensitive Endpoints Using the GET Method
Endpoints performing sensitive actions with GET requests are prime targets for OSRF. For example:
 
GET /settings.php?remove_account=1
Host: example.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0

If such endpoints exist and can be controlled via reflected input, they may be exploited for OSRF.



⚠️ Best Practices for Prevention
1. Avoid GET Methods for Sensitive Actions
Use POST methods for actions involving sensitive changes, as they require more intentional execution.

2. Validate and Sanitize Inputs
Ensure all user inputs, especially those reflected in attributes like
src, are properly validated and sanitized.

3. Implement Content Security Policies (CSP)
CSPs can limit where resources like images or iframes can be loaded from, reducing the risk of external request manipulation.

4. Monitor and Audit Application Behavior
Regularly test your application for unusual or unintended request behaviors to identify vulnerabilities early.

This additional layer of security awareness helps ensure OSRF vulnerabilities are addressed alongside CSRF for a more robust application defense.

Learn More:
https://github.com/daffainfo/AllAboutBugBounty/blob/master/On%20Site%20Request%20Forgery.md
πŸ‘8❀3πŸ”₯1
β˜„οΈSubprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains.

⚑️The tool offers concurrent scanning, allowing users to define their preferred concurrency level for faster results. Whether you are on Linux, Windows, or macos

➑️https://github.com/RevoltSecurities/Subprober
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘10❀4