Brut Security – Telegram
Brut Security
14.6K subscribers
902 photos
72 videos
287 files
956 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🔥Google Dork - Exposed Configs 🔍

site:example[.]com ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess | ext:json

©TakSec
Please open Telegram to view this post
VIEW IN TELEGRAM
30👍13🔥6
☄️JSRecon-Buddy - A simple browser extension to quickly find interesting security-related information on a webpage.

🔴https://github.com/TheArqsz/JSRecon-Buddy
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥248👍4👏4🤝1
dON'T fORGET tO gIVE rEACTIONS
🔥15
☄️ Malicious PDF Generator - Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

https://github.com/jonaslejon/malicious-pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
14👍9👏2
Google Dork - XSS Prone Parameters 🔥

site:example[.]com inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:&
Please open Telegram to view this post
VIEW IN TELEGRAM
👍118🤨1
Please open Telegram to view this post
VIEW IN TELEGRAM
10👍4🔥3👏2
🔥Oneliner to download ALL of @assetnote's wordlists:

⌨️ wget -r --no-parent -R "index.html*" wordlists-cdn.assetnote.io/data/ -nH -e robots=off
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥13
✈️OWASP Noir is an open-source tool designed to help security professionals and developers identify the attack surface of their applications. By performing static analysis on source code, Noir can discover API endpoints, web pages, and other potential entry points that could be targeted by attackers.

🗿owasp-noir.github.io/noir/
Please open Telegram to view this post
VIEW IN TELEGRAM
👍13
Hey Hunter's,
DarkShadow here back again!

SSRF in pdf generation!

this api endpoint send the pdf generation request:
POST /api/v1/convert/markdown/pdf

Add this payload:
<img src=‘burp collab url’ />

comes 200ok and hit request in burp collaborator.

You can follow me in my x.com/darkshadow2bd

#ssrf #bugbountytips
14🔥4
😂
😁55🗿104🐳3
☄️Photon - Fast web crawler for osint and recon

🚀https://github.com/s0md3v/Photon
Please open Telegram to view this post
VIEW IN TELEGRAM
👍21🔥81
Hey Hunter's,
DarkShadow here back again!


If i ask you, "what are attacks you tried in a login page?" So you mught tell me: SQLi, XSS, common CVEs, Auth bypass, leak cradintials etc. right!?


But these are commonly use by everyone. So think definitely and try unique and most underestimate attacks as like a pro. Here's I give 10 methods that i use to find vulnerabilities in login portal during my bug bounty hunting:


1. Read the js, if they use prototype then try to pollute the proto. If possible then it's might give you admin access or DOS attack.


2. If you find a admin login page, then obviously there high chances that possibly exist a admin registration page right, so try to find admin registration page. (Using Fuzz, js file to critical path leak etc.) and register a new admin!


3. Okays if comes login portal then why not we find password forget vulnerability! 

Okay, now reset the password with host header injection. You might got a reset password url with your domain name!


4. See the login page cookie header value, if token available then try jwt vulnerabilities. And of possible this give you admin access.


5. If you forget the password and got a valid otp, then inter the otp then copy the response. Now another time try to forget the password on victim mail address and inter a invalid otp, intercept the response pest the previous response. Might this response manipulation works for auth bypass.


6. Try business login flow! Register as a normal user now grep the username. And delete the user. Now try to register using the same username. Is the web application block you to register means user deleted but username still exist in database. So, now you can create broken links, even if possible then block usernames like admin, ceo, Domain_name etc.


7. You can try another logic flow bug: reset the password got a otp in your mail or number right. Now inter the otp, but wait before sending the request with otp intercept it and change the mail or number parameter value to victim mail or number and if vulnerable then auth bypassed.


8. Try custom headers like X-Forwarded-For, X-Cluster-Client-IP, X-Originating-IP,  X-Forwarded-Server etc. with 127.0.0.1 value. High chance to bypass the auth!


9. Try to bypass auth using punycode attack. Like register with a mail which like àtteçker@mail.com now try to register again a mail like attacker@mail.com if block the website means it's vulnerable for account takeover. Cause it's consider both same mail address, so now you can send the password reset link to your attacker@mail.com and access the àttaçker@mail account. (This is not a single why to the attack, there are multiple why to do it)


10. Try to make new vulnerability!!! When send the login username and password then add a new like \n and now you can try your customer payloads for SQLi, command injection etc. cause now possibly the firewall is not check the next line and you can try now all types of attacks. 


There are many more unique attack's available, but for demonstration i share only few attacks.

So guy's if you really love to read DarkShadow's methodology's show your love and you can follow me in my X account x.com/darkshadow2bd 



#bugbountytips #method 
29🫡5👏4👍2🗿1
🔥Google Dork - Sensitive Docs 📄

ext:txt | ext:pdf | ext:xml | ext:xls | ext:xlsx | ext:ppt | ext:pptx | ext:doc | ext:docx
intext:“confidential” | intext:“Not for Public Release” | intext:”internal use only” | intext:“do not distribute” site:example[.]com
Please open Telegram to view this post
VIEW IN TELEGRAM
👍154
CVE-2025-9079: Path Traversal in Mattermost, 8.0 rating❗️

A vulnerability in some versions of Mattermost allows attackers to execute arbitrary code via a malicious plugin.

Search at Netlas.io:
👉 Link: https://nt.ls/gCXcr
👉 Dork: http.noscript:"mattermost"

Vendor's advisories: https://mattermost.com/security-updates/
6🔥4🐳1
Google Dork – File Uploads 📂
site:example[.]com intext:"choose file" | intext:"select file" | intext:"upload PDF"
🔥13👍3
This media is not supported in your browser
VIEW IN TELEGRAM
😂
Developer's VS Penetration tester's 💀
😁41🗿4🔥2
😘dON'T fORGET tO gIVE rEACTIONS🫡
Please open Telegram to view this post
VIEW IN TELEGRAM
👍75