Brut Security
15K subscribers
958 photos
76 videos
290 files
1K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: [email protected]
Download Telegram
๐ŸŽฏ Mastering CRTO? This Resource is Pure Gold!

If you're preparing for Certified Red Team Operator (CRTO) or want to sharpen your adversary emulation skills, Iโ€™ve found something invaluable for you!

๐Ÿ”— Check here :
https://m4lici0u5.com/notes/crto-notes/

๐Ÿ” Whatโ€™s inside?

๐Ÿดโ€โ˜ ๏ธ Cobalt Strike โ€“ Beacons, pivoting & advanced tactics.
๐Ÿดโ€โ˜ ๏ธ AD Attacks โ€“ Lateral movement, Kerberoasting, DCSync & more.
๐Ÿดโ€โ˜ ๏ธ Bypassing Defenses โ€“ EDR evasion, AMSI bypass, OPSEC tricks.
๐Ÿดโ€โ˜ ๏ธ Persistence & PrivEsc โ€“ Staying stealthy like real APTs.
๐Ÿ”ฅ11๐Ÿ‘4๐Ÿ—ฟ4๐Ÿซก3
CVE-2024-13918, -13919: XSS in Laravel Framework, 8.0 ratingโ—๏ธ

The vulnerabilities allow an attacker to execute code in the victim's browser via Reflected XSS if the victim clicks on a decoy link.

More then 770k instances at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/95OAY
๐Ÿ‘‰ Dork: http.headers.set_cookie:"laravel_session="

Read more: https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20241209-01_Laravel_Reflected_XSS_via_Request_Parameter_in_Debug-Mode_Error_Page
๐Ÿ‘5โค3๐Ÿ˜ฑ1๐Ÿ‘จโ€๐Ÿ’ป1
๐Ÿ”–Subdomain Enumeration Using Rapiddns.io

function rappidns() {
curl -s "https://rapiddns.io/subdomain/$1?full=1" | grep -oE "[\.a-zA-Z0-9-]+\.$1" | tr '[:upper:]' '[:lower:]' | sort -u
}
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘17๐Ÿ˜ข2
Get Windows Domain Information:

C:\> nltest /DCLIST:DomainName
C:\> nltest /DCNAME:DomainName
C:\> nltest /DSGETDC:DomainName

These commands utilize nltest, a command-line tool included with Windows Server and some client versions (when Remote Server Administration Tools, RSAT, are installed).

Below is a detailed breakdown:

1. nltest /DCLIST:DomainName

Purpose: Lists all domain controllers for the specified domain (DomainName).

Output: Displays a list of domain controllers with their names, IP addresses, and site information.

Example:
C:\> nltest /DCLIST:EXAMPLE
DC: \\https://DC01.example.com [192.168.1.10] Site: Default-First-Site-Name
DC: \\https://DC02.example.com [192.168.1.11] Site: Default-First-Site-Name
The command completed successfully

2. nltest /DCNAME:DomainName

Purpose: Retrieves the name of a domain controller for the specified domain.

Output: Returns a single DC name, often the one the workstation is communicating with.

Example:
C:\> nltest /DCNAME:EXAMPLE
DC: \\https://DC01.example.com
The command completed successfully

3. nltest /DSGETDC:DomainName

Purpose: Queries and returns detailed information about a domain controller for the specified domain, including its name, IP, site, and more.

Output: Provides a verbose output with attributes like DC name, IP address, domain GUID, and forest details.

Example:
C:\> nltest /DSGETDC:EXAMPLE
DC: \\https://DC01.example.com
Address: 192.168.1.10
Dom Guid: {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}
Site: Default-First-Site-Name
Flags: PDC GC DS LDAP KDC TIMESERV GTIMESERV WRITABLE
The command completed successfully
๐Ÿ‘15โค6๐Ÿ”ฅ1
๐Ÿ—ฟ4
#promo Join for BB Tips - @pythagorex
๐Ÿ‘5๐Ÿค1
๐Ÿ‘ป๐Ÿ‘ปZseano's Bug Bounty methodology

๐Ÿคhttps://www.bugbountyhunter.com/methodology/zseanos-methodology.pdf
๐Ÿ”ฅ@brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿซก12๐Ÿ‘3๐Ÿ”ฅ3
โญ๏ธTip: Check out port 19071 for Vespa configuration server

Vespa is an open-source big data serving engine used for building applications that require real-time processing and serving of large datasets. The Vespa configuration server typically runs on port 19071. This server is responsible for managing the configuration of Vespa nodes and can sometimes expose sensitive information or be vulnerable to misconfigurations.

๐ŸคWhat to look for:

1. Open Port: Ensure that port 19071 is not exposed to the public internet without proper authentication and authorization mechanisms in place.

2. Configuration Files: Check if the configuration files are accessible or if there are any misconfigurations that could lead to information disclosure.

3. Authentication: Verify that the configuration server requires proper authentication and that default credentials have been changed.

4. Access Control: Ensure that access to the configuration server is restricted to only authorized personnel.

5. Logging and Monitoring: Look for any logging or monitoring issues that could expose sensitive information.

โš ๏ธExample Command:
To check if port 19071 is open, you can use
nmap:
nmap -p 19071 <target_ip>


If the port is open, you can try to access it using a web browser or tools like curl:
curl https://<target_ip>:19071

โญIf you find any vulnerabilities or misconfigurations, document them thoroughly and report them to the bug bounty program. Good luck!
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘9๐Ÿ”ฅ7โค3
๐Ÿ›กStruggling with privilege escalation or Active Directory attacks? Don't waste hoursโ€”use these 4 must-have resources:

โ€ข LOLBAS [Windows LOLBins abuse ] โ†’
https://lolbas-project.github.io/
โ€ข GTFOBins [Linux privilege escalation] โ†’
https://gtfobins.github.io/
โ€ข IppSec Rocks [HTB attack walkthroughs] โ†’
https://ippsec.rocks/?#
โ€ข WADComs [Windows AD enumeration] โ†’
https://wadcoms.github.io/
Please open Telegram to view this post
VIEW IN TELEGRAM
โค19๐Ÿ”ฅ2
Shodan Search Queries Cheat Sheet๐Ÿ”๐Ÿ“
โค31
๐ŸคFrogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit.

๐ŸŽคhttps://github.com/iamthefrogy/frogy2.0

โญ๏ธDemo - https://www.youtube.com/watch?v=LHlU4CYNj1M
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ8
Awesome Sqlmap Tampers-1.pdf
11.8 MB
๐Ÿ”ฅ8โค1๐Ÿ‘1
โœจHackTheBox Certified Penetration Tester Specialist Cheatsheet

๐Ÿคhttps://github.com/zagnox/CPTS-cheatsheet
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ41โค6๐Ÿ‘จโ€๐Ÿ’ป2
Don't forget to give reaction and stars โœจ
1โค19๐Ÿ”ฅ5๐Ÿ˜2
CVE-2024-10441: RCE in Synology products, 9.8 rating ๐Ÿ”ฅ

Synology DSM and BSM are vulnerable to Improper Encoding or Escaping of Output, which could potentially lead to remote execution of arbitrary code.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/KOa1N
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:b8f4bb2e2ba81cb86875fb89db4571278d6e23fd888313d0f4152b1adbc8bd08

Vendor's advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_20
๐Ÿ”ฅ7๐Ÿ‘3
๐Ÿ•ต๏ธโ€โ™‚๏ธ Bug Bounty Hunters, Hereโ€™s a Hidden Gem! ๐Ÿ’Ž
๐Ÿ“Œ Grab it now :
https://gowsundar.gitbook.io/book-of-bugbounty-tips

---------------------------------------------------------
๐Ÿš€ ๐‹๐ž๐ฏ๐ž๐ฅ ๐”๐ฉ ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐’๐ž๐œ ๐†๐š๐ฆ๐ž! ๐Ÿ”ฅ
๐ŸŒ brutsec.com
๐Ÿ“ฑ ๐“๐ž๐ฅ๐ž๐ ๐ซ๐š๐ฆ: t.iss.one/brutsecurity
๐Ÿ’ผ ๐—: x.com/brutsecurity
๐Ÿ“– ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐‘๐จ๐š๐๐ฆ๐š๐ฉ: topmate.io/saumadip/1391531
๐ŸŽ“ ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž ๐„๐ง๐ซ๐จ๐ฅ๐ฅ๐ฆ๐ž๐ง๐ญ: wa.link/brutsecurity
โญ ๐‹๐ข๐ค๐ž ๐ญ๐ก๐ข๐ฌ ๐ฉ๐จ๐ฌ๐ญ? โ†’ ๐…๐จ๐ฅ๐ฅ๐จ๐ฐ, ๐‰๐จ๐ข๐ง, ๐’๐ฎ๐›๐ฌ๐œ๐ซ๐ข๐›๐ž & ๐’๐ž๐ง๐ ๐’๐ญ๐š๐ซ๐ฌ ๐ญ๐จ ๐ฌ๐ก๐จ๐ฐ ๐ฒ๐จ๐ฎ๐ซ ๐ฌ๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ!
๐Ÿ”ฅ7โค3๐Ÿ—ฟ1
๐Ÿ”–The ultimate 403 Bypass wordlists and tester notes by JHaddix

๐Ÿ“ฑ Github: ๐Ÿ”— Link

---------------------------------------------------------
๐Ÿš€ ๐‹๐ž๐ฏ๐ž๐ฅ ๐”๐ฉ ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐’๐ž๐œ ๐†๐š๐ฆ๐ž! ๐Ÿ”ฅ
๐ŸŒ brutsec.com
๐Ÿ“ฑ ๐“๐ž๐ฅ๐ž๐ ๐ซ๐š๐ฆ: t.iss.one/brutsecurity
๐Ÿ’ผ ๐—: x.com/brutsecurity
๐Ÿ“– ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐‘๐จ๐š๐๐ฆ๐š๐ฉ: topmate.io/saumadip/1391531
๐ŸŽ“ ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž ๐„๐ง๐ซ๐จ๐ฅ๐ฅ๐ฆ๐ž๐ง๐ญ: wa.link/brutsecurity
โญ ๐‹๐ข๐ค๐ž ๐ญ๐ก๐ข๐ฌ ๐ฉ๐จ๐ฌ๐ญ? โ†’ ๐…๐จ๐ฅ๐ฅ๐จ๐ฐ, ๐‰๐จ๐ข๐ง, ๐’๐ฎ๐›๐ฌ๐œ๐ซ๐ข๐›๐ž & ๐’๐ž๐ง๐ ๐’๐ญ๐š๐ซ๐ฌ ๐ญ๐จ ๐ฌ๐ก๐จ๐ฐ ๐ฒ๐จ๐ฎ๐ซ ๐ฌ๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ!

#bugbounty #bugbountytips #cybersecurity #infosec #brutsecurity
๐Ÿ”ฅ8โค2
๐Ÿ‘ปCVE-2025-24071: Windows Explorer initiates an SMB authentication request upon extracting a .library-ms file from a .rar archive, exposing NTLM hashes. Extraction alone triggers the vulnerability.

โญ๏ธPOC- https://t.iss.one/brutsecurity_poc/45
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ”ฅ17๐Ÿ˜ฑ4โค3
dON'T fORGET tO gIVE rEACTIONS
๐Ÿ˜ฑ11๐Ÿ”ฅ7โค5๐Ÿ‘4
โšกThe Ultimate PNPT Study Guide โ€“ Master Pentesting & Crush the Exam!

๐Ÿ”—Link:
https://github.com/TrshPuppy/PNPT-study-guide
โค10๐Ÿ”ฅ4๐Ÿ‘3