Brut Security
14.8K subscribers
938 photos
73 videos
287 files
983 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: [email protected]
Download Telegram
Hey Hunters,

DarkShadow here back again—sorry for the delay, I’ve been a little sick. Please keep me in your prayers.

Anyway, just dropping a trick on how an out-of-scope target can lead to an in-scope critical vulnerability!

The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further what’s going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.

But here’s the twist—it was still showing the content from the original website I had requested. So I thought, maybe it’s working like a proxy?

Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside it—a config.php file.

Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessible—not just localhost!

I tried connecting… and boom! I was successfully connected.
But wait—this domain is out of scope, right?

That’s what I thought too… until I started reading there massive database and was shocked—
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.


At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly that—added an admin user to the database.

Now, on the target website, there’s a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?

BOOM! 💥
It logged me into the admin dashboard.


And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.


So guys, if you enjoyed this method, don’t forget to show some love—and please, pray for me, I’m really sick right now.

And don’t forget to follow me on X (Twitter):
x.com/Darkshadow2bd

#bugbountytips #infosec
👏2010👍5😱4
https://powerade.com.s3.amazonaws.com/index.html

guy's let's see whos explaination is better!

what is the impact after takeover a in-scop target S3 bucket?🤔
👍11🔥51🗿1
Hey Hunter's,
DarkShadow here back again...
Dropping a new POC in WordPress plugin arbitrary administrator role user creation to broken authentication lead.

Before, don't forget to share and show your love guy's.
For more follow me on my X 👉🏼
DarkShadow
24👍4👏3
CVE-2025-47577: Unrestricted Upload of File with Dangerous Type in TI WooCommerce Wishlist Plugin, 10.0 rating 🔥🔥🔥

Failure to check the types of uploaded files allows attackers to upload a web shell to the server and perform RCE.

Search at Netlas.io:
👉 Link: https://nt.ls/jYyss
👉 Dork: http.body:"plugins/ti-woocommerce-wishlist"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ti-woocommerce-wishlist/ti-woocommerce-wishlist-292-unauthenticated-arbitrary-file-upload
😱84👍2
😢8🗿1
List of 100 Web Vulnerabilities
🤝30🫡6🗿2😁1👨‍💻1
📣 1 Month Discord Nitro Giveaway! 📣

Want a free month of Discord Nitro? Here's your chance to win! 🔥

To enter:
1️⃣ Follow me on Medium: https://medium.com/@0xbrut
2️⃣ Send a screenshot as proof to my Telegram bot ✏️ @brutsecurity_bot

That’s it! 💥
Don’t miss out – support me and get a shot at Nitro! 💎
Please open Telegram to view this post
VIEW IN TELEGRAM
14🔥2🗿2😢1
This media is not supported in your browser
VIEW IN TELEGRAM
csprecon - Discover new target domains using Content Security Policy

🚨https://github.com/edoardottt/csprecon
🔥122
dON'T fORGET tO gIVE rEACTIONS
1🤝22🗿8
Hacking XSS with Browsers https://hackerone.com/reports/1209098
🤣393🔥2🗿1
⚠️wpprobe - WPProbe is a fast and efficient WordPress plugin scanner that leverages REST API enumeration (?rest_route) to detect installed plugins without brute-force.

🖥https://github.com/Chocapikk/wpprobe
Please open Telegram to view this post
VIEW IN TELEGRAM
16🔥6
Hey Hunter's,
DarkShadow here back again, dropping a really interesting thing!

🔥RCE in Auth Login

Don't forget to show your love hacker's ❤️
👏2714🫡7👍2🔥1🤨1
Hey Hunter's,
DarkShadow here back again, just dropping a simple dork that find every VDP in worl wide 😎

(body="/responsible-disclosure" || body="/.well-known/security.txt") && port="443"



#bugbountytips #infosec #dork
🔥168😁4🐳2🗿2👍1
Hey guys, DarkShadow here — back again.

You ever tried peeking inside a login panel that hits you with a 401 Unauthorized?
No login, no creds — just pure access to the content behind it.

I’ve got a wild dorking trick for that.
Not your regular Google dork — this one’s different. Real different. 😈

You interested?
Let me know — this one’s gonna blow your mind. 💥
🔥32👍5😱5🗿43
☄️I built a Semi-1-click script to bypass SSL pinning in Android Studio Emulator based on Noxer! Installs Magisk, patches it, and adds Burp cert.

💥95% done, launching soon!
Please open Telegram to view this post
VIEW IN TELEGRAM
17🐳1
Which Android emulator do you use for mobile pentesting?
Anonymous Poll
42%
Android Studio
29%
Genymotion
7%
Bluestacks
16%
Nox Player
7%
LDAP Player
😢93👨‍💻1
Brut Security
Which Android emulator do you use for mobile pentesting?
👀Struggling with manual setup for Nox Player in your pentesting workflow? 😓

⚠️Simplify it with this Noxer tool - https://www.linkedin.com/posts/mandal-saumadip_infosec-cybersecurity-cybersec-activity-7274320457254735872-w3PJ
Please open Telegram to view this post
VIEW IN TELEGRAM
9