Brut Security – Telegram
Brut Security
14.7K subscribers
914 photos
73 videos
287 files
970 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥21
⚠️Recon Tools For Web Pentesting⚠️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍5
⚡️Top 15 Scanners⚡️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
📱Join Our Discussion Channel📱
https://news.1rj.ru/str/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Hey everyone📣,

⚠️Can you believe it's already June? We've covered six months, but have we really dived into cybersecurity or web penetration testing yet? Have any of us snagged our first bug bounty or made it into a Hall of Fame?

📌Let's use the next six months to change that. Dedicate yourself fully to learning and practicing. Imagine where you could be by the end of the year—skilled, confident, and maybe even recognized in the cybersecurity world.

🔥Let’s go all in and fight for our freedom through knowledge and skills. Who’s ready to take on this challenge?

Cheers,
The Brut Security Team
☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10👍1💯1🗿1
2FA Security Issues.pdf
1.5 MB
👍3
RSEScan

📣A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization.📣

🌐POC VIDEO🌐
🔗Download🔗
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥1
Brut Security pinned «RSEScan 📣A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains…»
Reconnaissance- Phase1.pdf
1.5 MB
☄️Bug Bounty Reconnaissance-Phase 1☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
☄️Bug-Bounty-Wordlists☄️

📣A repository that includes all the important wordlists used while bug hunting.

🔗Link: https://github.com/YaS5in3/Bug-Bounty-Wordlists


#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6
Top Useful Extension For Pentesting and Bug hunting
👍31
💥Bug Bounty Tip: Don't Overlook Image Endpoints!💥

👉Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:

1. Gather All Target Endpoints: Collect endpoints from your target.

2. Filter for Image Extensions: Use a simple command to isolate image URLs.

cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt

3. Check for Live URLs: Ensure the filtered image URLs are active.

4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.

ℹ️ Success Story by GodfatherOrwa:
-He found a passport image at app[.]com/xxxx/cdn/file/xxx.jpg.
- Visiting app[.]com/xxxx/cdn/ revealed an open directory listing.
- The result? Tons of exposed PII!

👌Always check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!

Happy hunting, everyone!

Credit: @godfatherorwa

#bugbountytips #bugbountytip #bugbounty
👍5
Brut Security pinned Deleted message
Blind SQL Payloads
🔥7👍2
Media is too big
VIEW IN TELEGRAM
⚠️CVE-2024-29973: Unauthorized command injection in Zyxel NAS devices⚠️

🔍This command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 and NAS542 devices could allow an unauthenticated attacker to execute some OS commands by sending a crafted HTTP POST request.

📌PoC: https://github.com/k3lpi3b4nsh33/CVE-2024-29973

📣Dorks:
🔽Hunter: product.name="ZyXEL NAS542"||http://product.name="ZyXEL NAS326"
🔼FOFA: app="NAS542" || app="ZYXEL-NAS326"
🔽SHODAN: http.noscript:"Zyxel NAS326"
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯61
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Progressive Web App (PWA) Phishing⚠️

📌Attack Scenario: A user lands on index.html and clicks the "Install Microsoft Application" button. The install app prompt appears and once it is installed by the user, the JavaScript embedded in index.html redirects the PWA window to the phishing page that hase a fake URL bar at the top (i.e. mrd0x.html). Ensure that you're testing this over HTTPS to avoid encountering issues.

📣Blog Link: https://mrd0x.com/progressive-web-apps-pwa-phishing

🔗POC: https://github.com/mrd0x/PWA-Phishing

⚠️This is simply to demonstrate how PWA phishing works. Don't use it for illegal purposes.
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥31