Leaking the phone number of any Google user
| blog | https://brutecat.com |
| blog | https://brutecat.com |
Leaking the phone number of any Google user
Disclosing YouTube Creator emails via Content ID for $20,000
Leaking the email of any YouTube user for $10,000
So last week (on Sunday 1 December at 00:00), our server host canceled its service without warning.
TL;DR: we do not recommend using @[email protected] 's service
Everyone else: a short ๐งต
Opsec is a lot like planting a tree.
The best time to do it was 20 years ago. The second best time is now.
In case you missed it...the DEF CON video of my talk 'Splitting the Email Atom' is finally here! ๐ Learn how to turn an email address into RCE on Joomla, bypass Zero Trust defences, and exploit parser discrepancies for misrouted emails.
https://www.youtube.com/watch?v=JERBqoTllaE&list=PLoX0sUafNGbEkK0ai5P_DB2HDnljRAJyZ&index=2
D-Link tells users to trash old VPN routers over bug too dangerous to identify.
Hopefully folks realize they should replace it with another vendor.
This vuln was covered at DEF CON 32 by Sam Curry. TR-069 is an admin access protocol that lets DLink work with your router remotely (reset device, etc.). Bad actors use spoofed requests to change config data, read the MAC address, monitor traffic, and use them as botnets. TR-069 is industry standard
https://www.theregister.com/2024/11/20/dlink_rip_replace_router/
I spent the last 2 months pentesting Google. Over this time, I reported several critical exploits to Google VRP. I documented everything I learnt over these 2 months, including techniques for leaking endpoint information in a blog post: https://brutecat.com/articles/decoding-google
Along with this, I also open-sourced several tools that are useful for pentesting Google: https://github.com/ddd/googleapi_tools
I often see researchers feel hacking Google is too difficult, or not worth their time. I wrote this blog post hoping to demystify this. :)
We've all been there - staring at Google's search box, overwhelmed by the maze of complexity hiding behind that minimalist interface, thinking it's impossible to break in. The key to decoding Google? Converting the attack surface from a black box to a white box.
Recently open sourced another tool on GitHub: reverse engineered implementation of the internal Google Maps API.
This tool can be used to find **all Google Maps locations** by searching every tile given a zoom level.
I plan to publish ~300m maps location IDs from this project to archive.org soon! :)