Brut Security – Telegram
Brut Security
14.7K subscribers
911 photos
73 videos
287 files
967 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
https://cspbypass.com

A site where you can search for known CSP bypass gadgets to gain XSS.
4
Top Hacking / Cyber Security Related Posts
🪪By Daniel Kelley

🔗https://gold-marten-204.notion.site/2d292e0b941146ef858a125bf1cb0eb3
5👍3
CVE-2024-31449 and other: Multiple vulnerabilities in Redis, 4.5 - 8.8 rating❗️

Three fresh vulnerabilities allow an attacker to perform RCE due to errors in the Lua noscripting engine or DoS via malformed Access Control List selectors.

Search at Netlas.io:
👉 Link: https://nt.ls/1G7ul
👉 Dork: protocol:redis

Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5
👍61
🌐 Google Dorking Made Easy

Link : https://dorksearch.com/

This Website help you with Google Dorking Try it Now and Give Reactions 🤟

#bugbounty #bugbountytips
👍1🐳1
☄️TechDefence is Hiring☄️

📌Share Your Resume- +91 78618 86497
(No Calls)
Please open Telegram to view this post
VIEW IN TELEGRAM
SubOwner - This tool is designed to check for subdomain takeovers by resolving the CNAME records and verifying them against known vulnerable services.

🔗 https://github.com/ifconfig-me/subowner
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥75
Bug Bounty Beginner's.pdf
187.9 KB
Roadmap for Bug Bounty
4👍2🔥1
*CVE-2024-45409 | Ruby-SAML Auth Bypass In GitLab*
_*What You’ll Learn💡*_
1️⃣ *Overview | Dinoscription of CVE-2024-45409*
2️⃣ *Reconnaissance For CVE-2024-45409*
*Shodan.io*
*Censys.io*
*Fofa.info*
*Hunter.how*
*ZoomEYE.HK*
_<======================>_
3️⃣ *E͢x͢p͢l͢o͢i͢t͢ ☣️ CVE-2024-45409 | GiveWP WordPress Plugin Exploit*

4️⃣ *E͢x͢p͢l͢o͢i͢t͢ Installation📥*
5️⃣ *E͢x͢p͢l͢o͢i͢t͢ Tool Guide🧭*
6️⃣ *Impact_💥*
7️⃣ *Severity_⚠️*
8️⃣ *Remediation_♻️*
_https://yashsec.com/bug-bounty/cve-2024-45409-auth-bypass-in-gitlab/
👍3
CVE-2024-43582: RCE in RDP Servers, 8.1 rating❗️

A use after free vulnerability in some RDP servers could allow an attacker to carry out remote code execution. The patch is already available.

Search at Netlas.io:
👉 Link: https://nt.ls/Jyn4r
👉 Dork: protocol:rdp

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582
👍6
https://www.sonarsource.com/blog/why-code-security-matters-even-in-hardened-environments/

how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only
🔥61
Bookmark this website they always release good stuff
How would I exploit arbitrary file write into RCE on modern frameworks like Node js, Flask, Django ?

By overwriting existing templates with template injection payloads.
👍1
☄️ Exciting News for Aspiring Bug Hunters! ☄️

💥 Starting at the end of October, our Bug Bounty Course is designed to transform you from a beginner to a professional bug hunter. Learn the ins and outs of bug bounty hunting, including XSS, SQL Injection, and more. With 40 hours of live, online training, you'll gain the skills needed to identify and ethically report security flaws.
Don't miss this opportunity to boost your cybersecurity career!
📱 Enroll Now!

📱For more details, visit National Cyber Security Services

#sponsored by
Please open Telegram to view this post
VIEW IN TELEGRAM
⚠️Join Our Discussion Group ⚠️
🔥 https://news.1rj.ru/str/brutsec 🔥
Please open Telegram to view this post
VIEW IN TELEGRAM
𝐗𝐒𝐒 𝐢𝐧 𝐏𝐡𝐨𝐧𝐞 𝐍𝐮𝐦𝐛𝐞𝐫 𝐅𝐢𝐞𝐥𝐝 ? 👇

Recently I re-watched the NahamCon2022EU: RTFR (Read The Bleeping RFC) by securinti

One thing I was surprised to find out was that phone number fields can be vulnerable to XSS.

How is that possible?

According to the RFC it is possible to append "optional parameter" to the number. Something like:

 • 10203040;𝐞𝐱𝐭=+22
 • 10203040;𝐢𝐬𝐮𝐛=12345
 • 10203040;𝐩𝐡𝐨𝐧𝐞-𝐜𝐨𝐧𝐭𝐞𝐱𝐭=𝐞𝐱𝐚𝐦𝐩𝐥𝐞

This can lead to XSS if:

1. The library parses phone numbers according to RFC and accepts optional parameters such as "phone-context"

2. The phone number is reflected on the web interface without input validation or output encoding

So payloads like "10203040;𝐩𝐡𝐨𝐧𝐞-𝐜𝐨𝐧𝐭𝐞𝐱𝐭=<𝐬𝐜𝐫𝐢𝐩𝐭>𝐚𝐥𝐞𝐫𝐭(1)</𝐬𝐜𝐫𝐢𝐩𝐭>" CAN be a valid phone number and trigger XSS
1👍28🗿62
https://github.com/tomnomnom/gron

This is one of the best tools for dealing with large JSON data. It makes it easier to query complex JSON and turn it into different formats
I use it always to test web api that sends or receives big json blobs to understand what it's actually doing
👍3
Free TryHackMe Access
If you’re unable to purchase a personal voucher, you can use the following account for learning purposes:

TryHackMe Premium Account
Email: elmsi.youssef@gmail.com
Password: pasderemarque@123

Please use the account responsibly—do not change or delete any settings or information.
86👍11🔥2