Brut Security – Telegram
Brut Security
14.6K subscribers
905 photos
72 videos
287 files
959 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
👏3
Brut Security pinned «📣Understanding Bug Bounty Hunting for Newcomers📣 🎁Bug bounty hunting can seem appealing, but it’s important to know: 🖱High Skill Level Required: Success in bug bounty hunting demands a very high skill level. It's not just about using tools like Nuclei to…»
💥Last Week to Enroll for July Batch
▶️https://wa.link/7j7p6g
Please open Telegram to view this post
VIEW IN TELEGRAM
🤣🤣 Brother doing hardcore to get a bounty
🐳5🔥21
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
☄️Sensitive Information Disclosure Through Config File☄️

⚠️Steps To Reproduce:
ffuf -c -ac -r -u https://target[.]com/FUZZ -w wordlist.txt


⚠️Wordlists:
🔗https://github.com/six2dez/OneListForAll
🔗https://wordlists.assetnote.io/
🔗https://github.com/danielmiessler/SecLists
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5
🔥2
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating 🔥

The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.

Search at Netlas.io:
👉 Link: https://nt.ls/HvsUY
👉 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef

Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
IDOR.pdf
78.5 KB
👍1
Brut Security pinned «Keep Checking Old Posts 🍿»
Is X Bug Bounty Community
Anonymous Poll
38%
Toxic
62%
Great
url/?f=etc/passwd ==> 403
encode etc/passwd as base64

url/?f=L2V0Yy9wYXNzd2Q= ==> 200

#note
you can use this trick in SQL , SSTI , XSS , LFI , Etc...

By:@GodfatherOrwa

#bugbountytips #BugBounty
👍10🔥2🤔21