Brut Security – Telegram
Brut Security
14.7K subscribers
914 photos
73 videos
287 files
970 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🛠️Guide to Active Directory Hacking

📝Active Directory (AD) is a directory service developed by Microsoft to manage and store network information, offering a central location for access control and network security.

📰 Read more: https://en.iguru.gr/odigos-gia-active-directory-hacking/

🔖#infosec #cybersecurity #hacking #pentesting #security
This media is not supported in your browser
VIEW IN TELEGRAM
👨‍💻6👍3🤡2💯1
CVE-2024-39929: Bypass of attachment verification in Exim

Due to incorrect parsing of a multiline RFC 2231 header filename, an attacker can bypass attachment verification and send an executable payload to the victim.

Search at Netlas.io:
👉 Link: https://nt.ls/gRdtH
👉 Dork: smtp.banner:"Exim" NOT smtp.banner:"Exim 4.98"

Read more: https://bugs.exim.org/show_bug.cgi?id=3099#c4
👏3
Brut Security pinned «📣Understanding Bug Bounty Hunting for Newcomers📣 🎁Bug bounty hunting can seem appealing, but it’s important to know: 🖱High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei to…»
💥Last Week to Enroll for July Batch
▶️https://wa.link/7j7p6g
Please open Telegram to view this post
VIEW IN TELEGRAM
🤣🤣 Brother doing hardcore to get a bounty
🐳5🔥21
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
☄️Sensitive Information Disclosure Through Config File☄️

⚠️Steps To Reproduce:
ffuf -c -ac -r -u https://target[.]com/FUZZ -w wordlist.txt


⚠️Wordlists:
🔗https://github.com/six2dez/OneListForAll
🔗https://wordlists.assetnote.io/
🔗https://github.com/danielmiessler/SecLists
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5
🔥2
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating 🔥

The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.

Search at Netlas.io:
👉 Link: https://nt.ls/HvsUY
👉 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef

Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
IDOR.pdf
78.5 KB
👍1