Brut Security
14.8K subscribers
946 photos
75 videos
289 files
990 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Forwarded from Brut Security (Saumadip Mandal)
bounty_tips_100+.pdf
18.3 MB
❀10
⚑️Want to download 100+ Bug Bounty Tips collected from X?

βœ…Download the PDF from here - https://t.iss.one/brutsecurity/767

#BugBounty #bugbountytips
πŸ‘7πŸ”₯3
⚑️GoSearch - OSINT tool for searching people's digital footprint and leaked passwords across various social networks, written in Go.

βœ…https://github.com/ibnaleem/gosearch

#bugbounty #bugbountytips #cybersecurity
πŸ‘8❀4πŸ”₯2
πŸ‘3
πŸ”– On-Site Request Forgery (OSRF): An Overview

🚨On-Site Request Forgery (OSRF) is a lesser-known but impactful vulnerability similar to Cross-Site Request Forgery (CSRF). While both involve unauthorized actions performed on behalf of an authenticated user, the fundamental distinction lies in the request origin.

- CSRF: The attacker initiates requests from their controlled domain to exploit a victim's authenticated session.
- OSRF: The requests originate from the vulnerable application itself, and the attacker controls where the requests are directed.

---

πŸ” Where to Find OSRF Vulnerabilities

1. Reflected Inputs in
src Attributes
Look for inputs that can be reflected in attributes like
src. Example vulnerable tags:
html 
<img src="OUR_INPUT_HERE">
<video width="400" height="200" controls src="OUR_INPUT_HERE">
<audio src="OUR_INPUT_HERE">
<iframe src="OUR_INPUT_HERE">


πŸ‘‰ If the input can be manipulated, it may allow the attacker to direct requests to their desired endpoints.

2. Sensitive Endpoints Using the GET Method
Endpoints performing sensitive actions with GET requests are prime targets for OSRF. For example:
 
GET /settings.php?remove_account=1
Host: example.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:47.0) Gecko/20100101 Firefox/47.0

If such endpoints exist and can be controlled via reflected input, they may be exploited for OSRF.



⚠️ Best Practices for Prevention
1. Avoid GET Methods for Sensitive Actions
Use POST methods for actions involving sensitive changes, as they require more intentional execution.

2. Validate and Sanitize Inputs
Ensure all user inputs, especially those reflected in attributes like
src, are properly validated and sanitized.

3. Implement Content Security Policies (CSP)
CSPs can limit where resources like images or iframes can be loaded from, reducing the risk of external request manipulation.

4. Monitor and Audit Application Behavior
Regularly test your application for unusual or unintended request behaviors to identify vulnerabilities early.

This additional layer of security awareness helps ensure OSRF vulnerabilities are addressed alongside CSRF for a more robust application defense.

Learn More:
https://github.com/daffainfo/AllAboutBugBounty/blob/master/On%20Site%20Request%20Forgery.md
πŸ‘8❀3πŸ”₯1
β˜„οΈSubprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains.

⚑️The tool offers concurrent scanning, allowing users to define their preferred concurrency level for faster results. Whether you are on Linux, Windows, or macos

➑️https://github.com/RevoltSecurities/Subprober
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘10❀4
🫑28❀13πŸ‘7🐳6🀨6
β›“ Easily Identify SSRF on a Website Using a Single Command*

This approach leverages a combination of powerful tools:

- Findomain: Gathers all subdomains related to the target site.
- Httpx: Verifies the accessibility of these domains.
- Getallurls (gau): Extracts URLs from sources like AlienVault OTX, Wayback Machine, and Common Crawl.
- Qsreplace: Substitutes query string values in URLs with a user-specified value.

Steps:
1. Install the mentioned tools.
2. Run the following command:
   findomain -t DOMAIN -q | httpx -silent -threads 1000 | gau | grep "=" | qsreplace your.burpcollaborator.net  

Replace your.burpcollaborator.net with your server or Burp Collaborator address.

This method streamlines the search for SSRF vulnerabilities effectively.

#bugbounty #web #ssrf #cybersecurity #bugbountytips
Credit: Aman Dara
πŸ‘10πŸ—Ώ9🀨2❀1
Linux-RedTeam.pdf
3 MB
πŸ‘5❀2
🚨403 Bypass list by @jhaddix Url Manipulation Methods Top 77 ways to bypass access control🚨
πŸ‘10❀8
CVE-2025-0282, -0283: Two vulnerabilities in Ivanti Connect Secure, 7.0 - 9.0 rating πŸ”₯

Stack-based buffer overflow caused potential RCE and privilege escalation.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/WMQwN
πŸ‘‰ Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US
πŸ‘4
Uncover Hidden Parameters & Spot XSS in One Go
❀19πŸ‘3
πŸ”₯CVE-2024-12828 POC. SafeUser Required
πŸ”₯3❀1
Super Blind SQL Injection- $20000 bounty | Thousands of targets still vulnerable” by priyanshu shakya https://medium.com/@pranshux0x/super-blind-sql-injection-20000-bounty-thousands-of-targets-still-vulnerable-f9b013765448
πŸ‘8πŸ”₯5
πŸ”₯MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.

βœ…
https://github.com/robotshell/magicRecon
πŸ‘5