Brut Security
14.7K subscribers
909 photos
73 videos
287 files
965 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
πŸ’₯Join Our Discussion Group πŸ’₯
πŸ”₯ https://t.iss.one/brutsec πŸ”₯
πŸ€– https://discord.gg/GZBsQMY6 πŸ€–
Please open Telegram to view this post
VIEW IN TELEGRAM
❀2πŸ‘2
⚑ FFUF Web Parser is a web-based tool built using React and Node.js that allows users to upload FFUF JSON files, apply a variety of filters, and export the filtered results to an Excel file. The tool supports filtering based on status codes, response data, lines, length, and URLs (including regex filtering). It also provides the ability to view, manipulate, and extract valuable information from FFUF fuzzing results.

πŸ”—
https://github.com/VikzSharma/ffufwebparser
πŸ‘6❀2
CVE-2024-37288, -37285: RCE in Kibana, 9.9 rating πŸ”₯πŸ”₯πŸ”₯

By improperly deserializing YAML, attackers can perform RCE. The attack is quite complex, but Elastic still recommends updating.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/cVF9O
πŸ‘‰ Dork: http.favicon.hash_sha256:30db4185530d8617e9f08858787a24b219ac5102321b48515baf5da7ac43b590

Read more: https://securityonline.info/critical-kibana-flaws-cve-2024-37288-cve-2024-37285-expose-systems-to-arbitrary-code-execution/
πŸ‘3❀1
πŸ—Ώ13πŸ”₯4🐳3❀1
Awesome Shodan Dorks
❀7πŸ‘1
CVE-2024-29847 and other: Multiple vulns in Ivanti EPM, 4.3 - 10.0 rating πŸ”₯πŸ”₯πŸ”₯

Numerous vulnerabilities in Ivanti. Includes, but is not limited to, RCE with the highest severity score!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/pHqay
πŸ‘‰ Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022?language=en_US
πŸ‘2❀1
Add the file configurations.xml to your wordlist.
Credit- @NoRed0x

#bugbountytips #bugbountytip
πŸ”₯5
Add to your wordlist:

auth/jwt/register
auth-demo/register/classic
auth-demo/register/modern
πŸ”₯3❀1
This media is not supported in your browser
VIEW IN TELEGRAM
FRIDAY MOTIVATION
❀8πŸ‘2
πŸš€ Shodan Search Dorks
πŸ‘4❀1
β˜„οΈ Common Open Redirection Parameters β˜„οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯10πŸ‘1
🐳5❀4
Forwarded from Netlas.io
Reminder: The update begins in one hour. Netlas will be temporarily offline. We apologize for any inconvenience caused.
Brut Security pinned Deleted message
Forwarded from Netlas.io
πŸ”₯ Netlas Private Scanner is Here! πŸ”₯

Now you can perform super fast non-intrusive scan of any attack surface or even single IP address, and analyze up-to-date results πŸ”

Other improvements:
🀝 Team features (sharing) added to the Discovery and Scanner
πŸ› Fixed the Discovery Download bug
πŸ–₯ Some minor updates

πŸ‘‰ Read more: https://docs.netlas.io/easm/scanner/
πŸ”₯1
CVE-2024-38816: Path Traversal in Spring Framework, 7.5 rating❗️

An attacker can create a malicious HTTP request and use it to gain access to any file accessible by the Spring application process. However, this is easily blocked using the Spring Firewall, so don't forget to enable it.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/jT0JO
πŸ‘‰ Dork: tag.name:"spring"

Vendor's advisory: https://spring.io/security/cve-2024-38816
❀1πŸ‘1
πŸ—Ώ12
πŸ†•CVE-2024-23692:Unauthenticated RCE Flaw in Rejetto HTTP File Server

πŸ”₯New PoC:
https://github.com/verylazytech/CVE-2024-23692

πŸ‘‡Dork:
HUNTER: web.body="HttpFileServer"&&header.server=="HFS 2.3m"
❀4πŸ‘3
CVE-2024-38812, -38813: Two vulnerabilities in VMware vCenter, 7.5 - 9.8 rating πŸ”₯

Heap overflow and privilege escalation vulns on unpatched servers allow attackers to easily perform RCE using a specially crafted network packet.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/44tRg
πŸ‘‰ Dork: http.title:"ID_VC_Welcome" OR certificate.issuer.domain_component:"vsphere"

Vendor's advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
πŸ‘2