Brut Security
14.6K subscribers
909 photos
73 videos
287 files
966 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Hey Hunter's,
DarkShadow here back again, just look at this...

IP Abuse Reports for
127.0.0.1

abuseipdb.com/check/127.0.0.1
😁6❀1🀝1🫑1
Hey Hunter's,
DarkShadow here back again, just look at this crazy one! I see someone find this crazy DOSπŸ”₯

Many GraphQL endpoints allow complex queries without auth. If protections like depth limits are missing.
Server will try to resolve it = CPU spike or crash (DOS).


Show your love Guy's ❀️
❀11πŸ—Ώ9🀝2
βœ…To detect Credit & Debit Card Number Leakage use this Nuclei Template - https://github.com/projectdiscovery/nuclei-templates/blob/main/http/miscellaneous/credit-card-number-detect.yaml
1πŸ‘9πŸ‘4❀1
πŸ˜‚πŸ˜‚
😁31πŸ”₯4πŸ‘2❀1
Hey Hunter's,
DarkShadow here back again
, just dropping a unique XSS method which execute in response header.

XSS in Facebook Response headerπŸ’₯

Tip: Always check XSS in redirection parameters.


show your love Guy's ❀️πŸ”₯

#bugbountytips #xss
❀18πŸ”₯6πŸ‘5πŸ—Ώ3
Hey Hunter's,
DarkShadow here back again, just dropping a unique method to bypass waf for XSS πŸ”₯

Waf Blocked ❌
javascript:alert()

Waf welcome βœ…
javascript:new Functiondocument.body.style.background="red"

βœ”οΈ If waf Blocked additional functions then try to change the background colorπŸ’₯


#bugbountytips #xss
πŸ‘10❀7πŸ‘4
Shodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member

Go Grab it Now ✨
😁14πŸ‘1πŸ—Ώ1
Brut Security pinned «Shodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member Go Grab it Now ✨»
Guy's DarkShadow here πŸ™‚
Tools: manual testing!
by DarkShadow
πŸ”₯15πŸ‘4❀1
Hunter's, DarkShadow here!

One liner for finding files

subfinder -d domain.com -silent | \
while read host; do \
 for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json /google-services.json /package.json /package-lock.json /composer.json /pom.xml /docker-compose.yml /manifest.json /service-worker.js; do \
  echo "$host$path"; \
 done; \
done | httpx -mc 200


#bugbountytips
❀29πŸ‘¨β€πŸ’»3πŸ—Ώ3πŸ”₯2
πŸ˜Άβ€πŸŒ«οΈ
😁33😒6πŸ—Ώ4❀1
Hunter's, the vulnerability was SSRF loading AWS cloud access.

and effects:

IITE – Institute of Information Technology & Education: Access to confidential student information, assessment data, and internal records.

MUHS – Maharashtra University of Health Sciences: Exposure of examination content, student records, and academic documents.

GSEB – Gujarat Secondary & Higher Secondary Education Board: Exposure of sensitive student records, exam papers, hall tickets, and related educational data.

RGUHS – Rajiv Gandhi University of Health Sciences: Access to examination papers, student records, and other confidential academic information.

i have a video POC wanna see how i was able exploit this bug!?


And don't forget to follow me πŸ‘‰πŸΌ x.com/darkshadow2bd


#ssrf
πŸ‘10πŸ‘3🫑2πŸ”₯1
If you are new, don't think pro's comes there position easily.

Finding a valid bug is not about how much tools you have or know, remember knowledge dose.

There no shortcut, no guidelines.
If you able to do your self, you able to gain experience.

~DarkShadow
❀28
Hey Hunter's,
DarkShadow here back again, just look at this one crazy boolean SQLi.

Tip: never forget to test boolean SQLi even it is a .json file parameter


Sometimes .json files load SQLi. So, it's not necessary that only php file parameters we hunt.

#sqli #bugbountytips
πŸ”₯12❀6πŸ‘3πŸ—Ώ3🀝2🐳1πŸ‘¨β€πŸ’»1
❀9