34 Followers
26 Following
68 Posts
hacker, security researcher. i run a blog @ https://brutecat.com
bloghttps://brutecat.com

Leaking the phone number of any Google user

https://brutecat.com/articles/leaking-google-phones

Bruteforcing the phone number of any Google user

From rate limits to no limits: How IPv6's massive address space and a crafty botguard bypass left every Google user's phone number vulnerable

brutecat.com

Disclosing YouTube Creator emails via Content ID for $20,000

https://brutecat.com/articles/youtube-creator-emails

Disclosing YouTube Creator Emails for a $20k Bounty

From creator privacy to phishing paradise: How a secret parameter could have exposed the private email addresses of monetized YouTube channels

brutecat.com

Leaking the email of any YouTube user for $10,000

https://brutecat.com/articles/leaking-youtube-emails

Leaking the email of any YouTube user for $10,000

What could've been the largest data breach in the world - an attack chain on Google services to leak the email address of any YouTube channel

brutecat.com

So last week (on Sunday 1 December at 00:00), our server host canceled its service without warning.

TL;DR: we do not recommend using @[email protected] 's service

Everyone else: a short ๐Ÿงต

Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library https://thehackernews.com/2024/12/researchers-uncover-backdoor-in-solanas.html
Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library

Malicious web3.js npm versions exposed private keys, risking crypto wallets. Update to secure versions now.

The Hacker News

Opsec is a lot like planting a tree.

The best time to do it was 20 years ago. The second best time is now.

In case you missed it...the DEF CON video of my talk 'Splitting the Email Atom' is finally here! ๐Ÿš€ Learn how to turn an email address into RCE on Joomla, bypass Zero Trust defences, and exploit parser discrepancies for misrouted emails.

https://www.youtube.com/watch?v=JERBqoTllaE&list=PLoX0sUafNGbEkK0ai5P_DB2HDnljRAJyZ&index=2

DEF CON 32 - Splitting the email atom exploiting parsers to bypass access controls - Gareth Heyes

YouTube

D-Link tells users to trash old VPN routers over bug too dangerous to identify.

Hopefully folks realize they should replace it with another vendor.

This vuln was covered at DEF CON 32 by Sam Curry. TR-069 is an admin access protocol that lets DLink work with your router remotely (reset device, etc.). Bad actors use spoofed requests to change config data, read the MAC address, monitor traffic, and use them as botnets. TR-069 is industry standard

https://www.theregister.com/2024/11/20/dlink_rip_replace_router/

D-Link tells users to trash old VPN routers over bug too dangerous to identify

Vendor offers 20% discount on new model, but not patches

The Register

I spent the last 2 months pentesting Google. Over this time, I reported several critical exploits to Google VRP. I documented everything I learnt over these 2 months, including techniques for leaking endpoint information in a blog post: https://brutecat.com/articles/decoding-google

Along with this, I also open-sourced several tools that are useful for pentesting Google: https://github.com/ddd/googleapi_tools

I often see researchers feel hacking Google is too difficult, or not worth their time. I wrote this blog post hoping to demystify this. :)

Decoding Google: Converting a Black Box to a White Box

We've all been there - staring at Google's search box, overwhelmed by the maze of complexity hiding behind that minimalist interface, thinking it's impossible to break in. The key to decoding Google? Converting the attack surface from a black box to a white box.

brutecat.com

Recently open sourced another tool on GitHub: reverse engineered implementation of the internal Google Maps API.

This tool can be used to find **all Google Maps locations** by searching every tile given a zoom level.

I plan to publish ~300m maps location IDs from this project to archive.org soon! :)

https://github.com/ddd/google_maps

GitHub - ddd/google_maps: Reverse-engineered implementation of the internal Google Maps API

Reverse-engineered implementation of the internal Google Maps API - ddd/google_maps

GitHub