Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Public Information Gathering.pdf
201.3 KB
โค7๐Ÿ”ฅ2๐Ÿ‘1
๐ŸŒŸDons Js Scanner๐ŸŒŸ

๐Ÿ‘‰Dons Js Scanner is a Python tool designed by Ali Essam to scan websites and uncover potential sensitive information within JavaScript files. It utilizes asynchronous programming for efficient web crawling and in-depth analysis.Dons Js Scanner is a Python tool designed by Ali Essam to scan websites and uncover potential sensitive information within JavaScript files. It utilizes asynchronous programming for efficient web crawling and in-depth analysis.

๐Ÿ‘‰https://github.com/dragonked2/Dons
โค7๐Ÿ‘3๐Ÿ‘1๐Ÿ”ฅ1๐Ÿ˜1
This media is not supported in your browser
VIEW IN TELEGRAM
๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ข๐ง๐  ๐‘๐š๐œ๐ž ๐‚๐จ๐ง๐๐ข๐ญ๐ข๐จ๐ง๐ฌ ๐ฎ๐ฌ๐ข๐ง๐  ๐๐ฎ๐ซ๐ฉ ๐‘๐ž๐ฉ๐ž๐š๐ญ๐ž๐ซ ๐†๐ซ๐จ๐ฎ๐ฉ๐ฌ ๐Ÿ‘‡

Race condition vulnerabilities abuse the server's (improper) way of handling concurrent requests.

These vulnerabilities can be used to perform limit-overrun attacks such as:
- using the same gift card multiple times
- redeeming the same coupon code
- bypassing a shop's quantity limits (nvidia video cards ๐Ÿ˜‰)

How to check for race condition vulns

1. Find the request that triggers the server-side check
2. Create a new tab group in Repeater
3. Add the same request multiple times to the group (CTRL+R)
4. Select "Send group in parallel"
5. Run the attack
6. Check if more than one response is valid

*
Credit- Andrei Agape

Lab: https://portswigger.net/web-security/race-conditions/lab-race-conditions-limit-overrun

Article: https://portswigger.net/research/smashing-the-state-machine
โค8๐Ÿ‘6๐Ÿ”ฅ4
๐Ÿค‘Bug Bounty Tips for SSRF๐Ÿค‘

Step 1: Subdomain Enumeration

โ€ขDNS Dumpster
โ€ขSublist3r
โ€ขAmass
โ€ขGoogle Dorking
โ€ขCertificate Transparency Logs
โ€ขsubdomainer

Step 2: Find Live Domains

cat all-domains.txt | httpx > all-live.txt

Step 3: Identify All URLs

cat all-live.txt | gauplus -subs -b png,jpg,gif,jpeg,swf,woff,gif,svg -o allUrls.txt

Step 4: Injection Burp Collaborator URL in Parameters

cat /home/casperino/tools/nuclei/httpx.txt | grep "=" | ./qsreplace 40ga7gynfy6pcg06ov.oastify.com > ssrf.txt

Step 5: Test for SSRF Vulnerabilities

cat ssrf.txt | httpx -fr

Step 6: How to check which URL is vulnerable

split -l 10 ssrf.txt output_file_
โค27๐Ÿ‘10๐Ÿ”ฅ7
๐Ÿ”ดEasy Open Redirect in 10 min๐Ÿ”ด
โค17๐Ÿ”ฅ2๐Ÿ‘1
Reconnaissance - Phase-2.pdf
806.9 KB
๐Ÿ‘7โค5๐Ÿ”ฅ1
API Pentesting Mindmap.pdf
45.2 KB
๐Ÿ”ฅ4โค2๐Ÿ‘1
๐ŸŒŸSubdomain Takeover Methodology๐ŸŒŸ
๐Ÿ”ฅ4โค3