Brut Security – Telegram
Brut Security
14.6K subscribers
904 photos
72 videos
287 files
958 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
⚠️Join Our Discussion Group ⚠️
🔥 https://news.1rj.ru/str/brutsec 🔥
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Brut Security pinned «⚠️Join Our Discussion Group ⚠️ 🔥 https://news.1rj.ru/str/brutsec 🔥»
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Subprober - An essential HTTP multi-purpose Probing Tool for Penetration Testers and Security Researchers with Asynchronous httpx client support.

🔥Download: https://github.com/RevoltSecurities/Subprober
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍31
🚨Payloads - Payload for bug bounty!🚨
🔗 Download https://github.com/1BlackLine/Payloads
👍5🔥1
🤖 Bug Bounty Target - https://bughunters.jahezgroup.com/en
Please open Telegram to view this post
VIEW IN TELEGRAM
👏3
☄️Will Drop A New BB Platform If We Reach 4K by Upcoming Week☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6❤‍🔥1🔥1👏1😁1
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️CVE-2024-36991: Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on Windows.

📣Sign Up On Netlas.io: https://app.netlas.io/ref/9cc61538/
📣Join Official Netlas Telegram: https://news.1rj.ru/str/netlas

🔴In Splunk Enterprise versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows.

PoC:
https://github.com/bigb0x/CVE-2024-36991

ℹ️Netlas Dork: http.body:"splunk-Enterprise"
Please open Telegram to view this post
VIEW IN TELEGRAM
2👍1
📣Understanding Bug Bounty Hunting for Newcomers📣

🎁Bug bounty hunting can seem appealing, but it’s important to know:

🖱High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei to scan public programs.

🖱Reality Check: Many see bug bounty hunting as a way to financial freedom or a high-paying job. However, if you have the skills to excel here, you can probably find other well-paying jobs in cybersecurity.

🖱Consider Your Location: Bug bounty hunting might be more attractive if you live in a country with a low average salary. Otherwise, it’s better pursued for fun or experience rather than as your main source of income.

🖱Extra Income and Experience: It can be great for earning extra money and gaining experience, but it’s not a reliable primary income source.

💳Bottom Line: Bug bounty hunting can be enjoyable and rewarding as a side activity, but it’s not the best choice for a main job once you understand the reality of the work involved.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
🛠️Guide to Active Directory Hacking

📝Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.

📰 Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/

🔖#infosec #cybersecurity #hacking #pentesting #security
This media is not supported in your browser
VIEW IN TELEGRAM
👨‍💻6👍3🤡2💯1
CVE-2024-39929: Bypass of attachment verification in Exim

Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.

Search at Netlas.io:
👉 Link: https://nt.ls/gRdtH
👉 Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"

Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
👏3
Brut Security pinned «📣Understanding Bug Bounty Hunting for Newcomers📣 🎁Bug bounty hunting can seem appealing, but it’s important to know: 🖱High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei to…»