Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Brut Security pinned ยซ๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link. ๐Ÿ“Œ How it works: โœฆ Click our link: https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96โ€ฆยป
๐ŸŽ‰ Happy Independence Day, India! ๐Ÿ‡ฎ๐Ÿ‡ณ

Today we celebrate freedom, unity, and the courage to protect what matters.
To all our friends across the globe โ€” hereโ€™s to peace, respect, and security for every nation. ๐ŸŒ๐Ÿ’ป

Love from the Brut Security family to yours. โค๏ธ
โค21
Hey Hunter's,
DarkShadow here back again, just look at this...

IP Abuse Reports for
127.0.0.1

abuseipdb.com/check/127.0.0.1
๐Ÿ˜6โค1๐Ÿค1๐Ÿซก1
Hey Hunter's,
DarkShadow here back again, just look at this crazy one! I see someone find this crazy DOS๐Ÿ”ฅ

Many GraphQL endpoints allow complex queries without auth. If protections like depth limits are missing.
Server will try to resolve it = CPU spike or crash (DOS).


Show your love Guy's โค๏ธ
โค11๐Ÿ—ฟ9๐Ÿค2
โœ…To detect Credit & Debit Card Number Leakage use this Nuclei Template - https://github.com/projectdiscovery/nuclei-templates/blob/main/http/miscellaneous/credit-card-number-detect.yaml
1๐Ÿ‘9๐Ÿ‘4โค1
๐Ÿ˜‚๐Ÿ˜‚
๐Ÿ˜31๐Ÿ”ฅ4๐Ÿ‘2โค1
Hey Hunter's,
DarkShadow here back again
, just dropping a unique XSS method which execute in response header.

XSS in Facebook Response header๐Ÿ’ฅ

Tip: Always check XSS in redirection parameters.


show your love Guy's โค๏ธ๐Ÿ”ฅ

#bugbountytips #xss
โค18๐Ÿ”ฅ6๐Ÿ‘5๐Ÿ—ฟ3
Hey Hunter's,
DarkShadow here back again, just dropping a unique method to bypass waf for XSS ๐Ÿ”ฅ

Waf Blocked โŒ
javascript:alert()

Waf welcome โœ…
javascript:new Functiondocument.body.style.background="red"

โœ”๏ธ If waf Blocked additional functions then try to change the background color๐Ÿ’ฅ


#bugbountytips #xss
๐Ÿ‘10โค7๐Ÿ‘4
Shodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member

Go Grab it Now โœจ
๐Ÿ˜14๐Ÿ‘1๐Ÿ—ฟ1
Brut Security pinned ยซShodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member Go Grab it Now โœจยป
Guy's DarkShadow here ๐Ÿ™‚
Tools: manual testing!
by DarkShadow
๐Ÿ”ฅ15๐Ÿ‘4โค1
Hunter's, DarkShadow here!

One liner for finding files

subfinder -d domain.com -silent | \
while read host; do \
 for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json /google-services.json /package.json /package-lock.json /composer.json /pom.xml /docker-compose.yml /manifest.json /service-worker.js; do \
  echo "$host$path"; \
 done; \
done | httpx -mc 200


#bugbountytips
โค29๐Ÿ‘จโ€๐Ÿ’ป3๐Ÿ—ฟ3๐Ÿ”ฅ2
๐Ÿ˜ถโ€๐ŸŒซ๏ธ
๐Ÿ˜33๐Ÿ˜ข6๐Ÿ—ฟ4โค1
Hunter's, the vulnerability was SSRF loading AWS cloud access.

and effects:

IITE โ€“ Institute of Information Technology & Education: Access to confidential student information, assessment data, and internal records.

MUHS โ€“ Maharashtra University of Health Sciences: Exposure of examination content, student records, and academic documents.

GSEB โ€“ Gujarat Secondary & Higher Secondary Education Board: Exposure of sensitive student records, exam papers, hall tickets, and related educational data.

RGUHS โ€“ Rajiv Gandhi University of Health Sciences: Access to examination papers, student records, and other confidential academic information.

i have a video POC wanna see how i was able exploit this bug!?


And don't forget to follow me ๐Ÿ‘‰๐Ÿผ x.com/darkshadow2bd


#ssrf
๐Ÿ‘10๐Ÿ‘3๐Ÿซก2๐Ÿ”ฅ1
If you are new, don't think pro's comes there position easily.

Finding a valid bug is not about how much tools you have or know, remember knowledge dose.

There no shortcut, no guidelines.
If you able to do your self, you able to gain experience.

~DarkShadow
โค28
Hey Hunter's,
DarkShadow here back again, just look at this one crazy boolean SQLi.

Tip: never forget to test boolean SQLi even it is a .json file parameter


Sometimes .json files load SQLi. So, it's not necessary that only php file parameters we hunt.

#sqli #bugbountytips
๐Ÿ”ฅ12โค6๐Ÿ‘3๐Ÿ—ฟ3๐Ÿค2๐Ÿณ1๐Ÿ‘จโ€๐Ÿ’ป1