If you liked the posts, tap the heart. That tiny click means a lot. β€οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
β€30
Forwarded from Brut Security
Common Security Issues in FinanciallyOriented Web Applications
π₯6β€3
β‘Bug Bounty Tip π
β Level up your recon with GitHub's new regex search on cs.github.com! Hunt for hardcoded credentials like SSH & FTP connection strings.
π¨Example Dorks:
/ssh:\/\/.*:.*@.*target\.com/
/ftp:\/\/.*:.*@.*target\.com/
β Level up your recon with GitHub's new regex search on cs.github.com! Hunt for hardcoded credentials like SSH & FTP connection strings.
π¨Example Dorks:
/ssh:\/\/.*:.*@.*target\.com/
/ftp:\/\/.*:.*@.*target\.com/
β€21π1
If you liked the posts, tap the heart. That tiny click means a lot. β€οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
β€15
CVE-2025-42944, -42937, -42910, and other: Multiple vulnerabilities in SAP NetWeaver, 5.3 - 10.0 π₯π₯π₯
In its October bulletin, SAP published a list of 13 new vulnerabilities affecting NetWeaver, NetWeaver AS Java, and other products. These vulnerabilities include Insecure Deserialization, Information Disclosure, etc.
Search at Netlas.io:
π Link: https://nt.ls/aBHGg
π Dork: http.headers.server:"NetWeaver"
Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html
In its October bulletin, SAP published a list of 13 new vulnerabilities affecting NetWeaver, NetWeaver AS Java, and other products. These vulnerabilities include Insecure Deserialization, Information Disclosure, etc.
Search at Netlas.io:
π Link: https://nt.ls/aBHGg
π Dork: http.headers.server:"NetWeaver"
Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html
β€8π2
π¨ Critical zero-day tagged as CVE-2025-61882 (CVSS 9.8) affecting Oracle E-Business Suite
π₯³ Nuclei Vulnerability Detection Script:
https://github.com/rxerium/CVE-2025-61882
π’ This vulnerability is remotely exploitable without authentication.
https://github.com/rxerium/CVE-2025-61882
Please open Telegram to view this post
VIEW IN TELEGRAM
β€13π₯3
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯10β€3
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯12
Please open Telegram to view this post
VIEW IN TELEGRAM
β€9π₯4
Media is too big
VIEW IN TELEGRAM
Backdoor vs WAF π€£
As like the same think happens when WAF try to detect backdoor and the backdoor hide there self using encoding etc.π
As like the same think happens when WAF try to detect backdoor and the backdoor hide there self using encoding etc.π
π13β€2π2π€¨2
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯14π2β€1
Hey Hunterβs
DarkShadow here back again!
bugbounty tip:
[easy to find critical bugs, follow this method]
1. find a api sensitive endpoint (must be leak sensitive info)
2. look headers "Cache-Control, CF-Cache-Status, Via, X-Cache, ETag, Age" confirm they store cache or not. (if stored try web cache deception)
3. change the HTTP request method (like: GET to POST, GET to HEAD, POST to PUT etc.)
4. if you find endpoints like: /api/users/123 use array based iDOR vulnerability (like: /api/users/123,122)
Donβt forget to show your love guys.
#bugbountytip #authbypass
DarkShadow here back again!
bugbounty tip:
[easy to find critical bugs, follow this method]
1. find a api sensitive endpoint (must be leak sensitive info)
2. look headers "Cache-Control, CF-Cache-Status, Via, X-Cache, ETag, Age" confirm they store cache or not. (if stored try web cache deception)
3. change the HTTP request method (like: GET to POST, GET to HEAD, POST to PUT etc.)
4. if you find endpoints like: /api/users/123 use array based iDOR vulnerability (like: /api/users/123,122)
Donβt forget to show your love guys.
#bugbountytip #authbypass
β€32π₯5π3π2π¨βπ»1
assetfinder *.com | gau | egrep -v '(.css|.svg)' | while read -r url; do js=$(curl -s --fail "$url") || continue; vars=$(printf "%s" "$js" | grep -Po 'var\s+\K[A-Za-z0-9_]+' | sed 's/$/=xss/' | sort -u); [ -n "$vars" ] && printf '\e[1;33m%s\n\e[1;32m%s\n' "$url" "$vars"; done
1. assetfinder + gau gathers reachable assets.
2. The loop pulls each URL, extracts var names from JS, and appends =xss so you get quick candidate parameters to fuzz.
3. You can feed those param names into quick fuzzers, Burp intruder, or manual probes to check for reflection, improper CSP, or unsafe eval usage.
1. Look for parameter-ish names (token, apiKey, path, callback, next, etc.).
2. Check if any appear in query strings or DOM sinks.
3. Verify whether values are reflected without encoding or used in eval()/innerHTML.
Please open Telegram to view this post
VIEW IN TELEGRAM
β€20
If you ever get a chance to comment or rate Brut Security, how much would you rate it? π
Anonymous Poll
47%
100%
37%
80%
11%
50%
11%
20%
π₯7β€5
Forwarded from Brut Security
This media is not supported in your browser
VIEW IN TELEGRAM
javascript:(async function(){let scanningDiv=document.createElement("div");scanningDiv.style.position="fixed",scanningDiv.style.bottom="0",scanningDiv.style.left="0",scanningDiv.style.width="100%",scanningDiv.style.maxHeight="50%",scanningDiv.style.overflowY="scroll",scanningDiv.style.backgroundColor="white",scanningDiv.style.color="black",scanningDiv.style.padding="10px",scanningDiv.style.zIndex="9999",scanningDiv.style.borderTop="2px solid black",scanningDiv.innerHTML="<h4>Scanning...</h4>",document.body.appendChild(scanningDiv);let e=[],t=new Set;async function n(e){try{const t=await fetch(e);return t.ok?await t.text():(console.error(`Failed to fetch ${e}: ${t.status}`),null)}catch(t){return console.error(`Error fetching ${e}:`,t),null}}function o(e){return(e.startsWith("/")||e.startsWith("./")||e.startsWith("../"))&&!e.includes(" ")&&!/[^\x20-\x7E]/.test(e)&&e.length>1&&e.length<200}function s(e){return[...e.matchAll(/['"]((?:\/|\.\.\/|\.\/)[^'"]+)['"]/g)].map(e=>e[1]).filter(o)}async function c(o){if(t.has(o))return;t.add(o),console.log(`Fetching and processing: ${o}`);const c=await n(o);if(c){const t=s(c);e.push(...t)}}const l=performance.getEntriesByType("resource").map(e=>e.name);console.log("Resources found:",l);for(const e of l)await c(e);const i=[...new Set(e)];console.log("Final list of unique paths:",i),console.log("All scanned resources:",Array.from(t)),scanningDiv.innerHTML=`<h4>Unique Paths Found:</h4><ul>${i.map(e=>`<li>${e}</li>`).join("")}</ul>`})();
Please open Telegram to view this post
VIEW IN TELEGRAM
β€26π1π₯1π¨βπ»1