Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โš ๏ธBypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulation techniques. It also includes fuzzing for HTTP methods and protocol versions, making it a versatile addition to any web security researcher's toolkit.

๐Ÿ–ฅ https://github.com/nazmul-ethi/Bypass-Four03
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ8โค1๐Ÿ‘1
Brut Security pinned ยซ๐ŸšจIf you're looking for accurate IoT results, then Sign Up On @Netlas ๐Ÿ˜ฎโ€๐Ÿ’จhttps://app.netlas.io/ref/9cc61538/ยป
๐Ÿ‘6๐Ÿ”ฅ3๐Ÿ—ฟ1
โ˜„๏ธSubowner - A Simple python based tool to check for subdomain takeovers in mass scanning. Supports, AWS, Fastly, Shopify, Azure etc.

๐Ÿšจhttps://github.com/ifconfig-me/subowner
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ6
โค2
Finding Hidden Parameter & Potential XSS with Arjun + KXSS

arjun -q -u target -oT arjun && cat arjun | awk -F'[?&]' '{baseUrl=$1; for(i=2; i<=NF; i++) {split($i, param, "="); print baseUrl "?" param[1] "="}}' | kxss
โค13
JS Recon : WaybackURLs & HTTPX

waybackurls url | grep '\.js$' | awk -F '?' '{print $1}' | sort -u | xargs -I{} python lazyegg[.]py "{}" --js_urls --domains --ips > urls && cat urls | grep '\.' | sort -u | xargs -I{} httpx -silent -u {} -sc -title -td
๐Ÿ‘6โค3
PRO TIP TO DETECT CSTI

- in your proxy add a match and replace rule for some keywords to make changes in the response

eg : TESTCSTI = {{7*9}}
CVE-2024-8698: Privelege Escalation in Keycloak, 7.7 ratingโ—๏ธ

Improper SAML signature verification allows an attacker to create a document that is only partially signed. Due to the vulnerability, the entire document will be considered signed, which may lead to privelege escalation.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/LJfRK
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:47dcf1f1a8f1afd68297a294a263849069a7a62b2e86550241416c2cc56c5676

Read more: https://access.redhat.com/security/cve/CVE-2024-8698
โค1
๐Ÿ”ฅ4๐Ÿ—ฟ2โค1
CVE-2024-47062: SQL Injection and Auth Bypass in Navidrome Music Server, 9.4 rating ๐Ÿ”ฅ

The latest advisory disclosed several vulnerabilities, which in theory allow an attacker to gain access to sensitive data.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/N9Jj8
๐Ÿ‘‰ Dork: http.description:"Navidrome Music Server"

Vendor's advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-58vj-cv5w-v4v6
๐Ÿ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
DUPLICATE
๐Ÿ—ฟ6๐Ÿณ2๐Ÿ‘1
โšก๏ธGoogle Dorks - Vulnerable Parameters โšก๏ธ


โ›”๏ธXSS prone parameters:

inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:example[.]com

โ›”๏ธOpen Redirect prone parameters

inurl:url= | inurl:return= | inurl:next= | inurl:redirect= | inurl:redir= | inurl:ret= | inurl:r2= | inurl:page= inurl:& inurl:http site:example[.]com

โ›”๏ธSQLi Prone Parameters

inurl:id= | inurl:pid= | inurl:category= | inurl:cat= | inurl:action= | inurl:sid= | inurl:dir= inurl:& site:example[.]com

โ›”๏ธSSRF Prone Parameters

inurl:http | inurl:url= | inurl:path= | inurl:dest= | inurl:html= | inurl:data= | inurl:domain= | inurl:page= inurl:& site:example[.]com

โ›”๏ธLFI Prone Parameters

inurl:include | inurl:dir | inurl:detail= | inurl:file= | inurl:folder= | inurl:inc= | inurl:locate= | inurl:doc= | inurl:conf= inurl:& site:example[.]com

โ›”๏ธRCE Prone Parameters

inurl:cmd | inurl:exec= | inurl:query= | inurl:code= | inurl:do= | inurl:run= | inurl:read= | inurl:ping= inurl:& site:example[.]com

๐Ÿ”† Credit- Mike Takashi
๐Ÿ‘13โค4๐Ÿ”ฅ4
Media is too big
VIEW IN TELEGRAM
๐Ÿ”–Hacking Kia: Remotely Controlling Cars With Just a License PlateNew writeup from Specters and Sam Curry: They were finally allowed to disclose a vulnerability reported to Kia that could have allowed an attacker to remotely control nearly all vehicles made after 2013, using only the license plate.

Full Blog:
https://samcurry.net/hacking-kia
๐Ÿ‘3โค2