Brut Security – Telegram
Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Awesome Shodan Dorks
7👍1
CVE-2024-29847 and other: Multiple vulns in Ivanti EPM, 4.3 - 10.0 rating 🔥🔥🔥

Numerous vulnerabilities in Ivanti. Includes, but is not limited to, RCE with the highest severity score!

Search at Netlas.io:
👉 Link: https://nt.ls/pHqay
👉 Dork: http.headers.set_cookie:("JSESSIONID" "Path" "/mifs")

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022?language=en_US
👍21
Add the file configurations.xml to your wordlist.
Credit- @NoRed0x

#bugbountytips #bugbountytip
🔥5
Add to your wordlist:

auth/jwt/register
auth-demo/register/classic
auth-demo/register/modern
🔥31
🚀 Shodan Search Dorks
👍41
☄️ Common Open Redirection Parameters ☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10👍1
🐳54
Forwarded from Netlas.io
Reminder: The update begins in one hour. Netlas will be temporarily offline. We apologize for any inconvenience caused.
Brut Security pinned Deleted message
Forwarded from Netlas.io
🔥 Netlas Private Scanner is Here! 🔥

Now you can perform super fast non-intrusive scan of any attack surface or even single IP address, and analyze up-to-date results 🔍

Other improvements:
🤝 Team features (sharing) added to the Discovery and Scanner
🐛 Fixed the Discovery Download bug
🖥 Some minor updates

👉 Read more: https://docs.netlas.io/easm/scanner/
🔥1
CVE-2024-38816: Path Traversal in Spring Framework, 7.5 rating❗️

An attacker can create a malicious HTTP request and use it to gain access to any file accessible by the Spring application process. However, this is easily blocked using the Spring Firewall, so don't forget to enable it.

Search at Netlas.io:
👉 Link: https://nt.ls/jT0JO
👉 Dork: tag.name:"spring"

Vendor's advisory: https://spring.io/security/cve-2024-38816
1👍1
🗿12
🆕CVE-2024-23692:Unauthenticated RCE Flaw in Rejetto HTTP File Server

🔥New PoC:
https://github.com/verylazytech/CVE-2024-23692

👇Dork:
HUNTER: web.body="HttpFileServer"&&header.server=="HFS 2.3m"
4👍3
CVE-2024-38812, -38813: Two vulnerabilities in VMware vCenter, 7.5 - 9.8 rating 🔥

Heap overflow and privilege escalation vulns on unpatched servers allow attackers to easily perform RCE using a specially crafted network packet.

Search at Netlas.io:
👉 Link: https://nt.ls/44tRg
👉 Dork: http.noscript:"ID_VC_Welcome" OR certificate.issuer.domain_component:"vsphere"

Vendor's advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
👍2
Looking for Active Discord Moderators. Do DM Me With Your Past Experiences. 👀
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
🗿4🔥2
☄️SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.

📌https://github.com/RevoltSecurities/Spideyx

🎤@mrz_0047
Please open Telegram to view this post
VIEW IN TELEGRAM
🗿54🔥3
https://github.com/pdelteil/scammy-bbp This repository contains a list of all the bug bounty programs that do not value the time and effort of hackers correctly. (Before you hunt on any target it's better to have reviews from other hackers)
10👍1
Brut Security pinned «https://github.com/pdelteil/scammy-bbp This repository contains a list of all the bug bounty programs that do not value the time and effort of hackers correctly. (Before you hunt on any target it's better to have reviews from other hackers)»