Shlomie Liberow Profile
Shlomie Liberow

@Shlibness

Followers
3K
Following
851
Statuses
1K

Head of Hacker R&D @Hacker0x01. Lover of 4AM shell battles. All things hacking!

London
Joined June 2009
Don't wanna be here? Send us removal request.
@Shlibness
Shlomie Liberow
5 years
Visit --> SSO Visit gt; login Reviews Javascript --> if (data == 'SUCCESS') { location.href = "/admin/<snipped>?uname="+username+""; } Visit: lt;snipped>?uname=admin Admin Access... #bugbountytips
2
85
259
@Shlibness
Shlomie Liberow
2 days
RT @0xLupin: We just released a new article on how we made 50,000$ in #BugBounty by doing a really cool Software Supply Chain Attack🔥 🔗Lin…
0
100
0
@Shlibness
Shlomie Liberow
16 days
@infosec_au @mgianarakis Congratulations shubs!!
0
0
1
@Shlibness
Shlomie Liberow
27 days
Working on exploiting a SSRF where the service is using axios. Looking at GH issues shows a PR that would have been perfect, allowing for local file read Reviewing the profile of this "helpful" PR [that was never merged] shows some suspicious biases 😂
Tweet media one
1
0
25
@Shlibness
Shlomie Liberow
28 days
@infinitelogins Blog blog blog
0
0
3
@Shlibness
Shlomie Liberow
30 days
Key Learnings: - Deleted secrets live forever in Git history. - The biggest risks aren’t always cutting-edge—they’re often basics - Much of Web3 often runs on Web2 infra - with cryptocurrency sprinkled on top 👉 For the full details, see
0
0
11
@Shlibness
Shlomie Liberow
2 months
/ remind me in 34 years
@business
Bloomberg
2 months
The EU is committing to build a $11.13 billion constellation of satellites that will provide the bloc with encrypted global internet connectivity in a bid to provide a homegrown alternative to Elon Musk’s Starlink
0
0
2
@Shlibness
Shlomie Liberow
2 months
Getting an early night sleep because openai is down. Our overlords are merciful at times
Tweet media one
1
0
6
@Shlibness
Shlomie Liberow
3 months
Always a joy collaborating with @Jayesh25_ and digging in deep
@Jayesh25_
Jayesh Madnani
3 months
🚨 Yay, we were rewarded with $20,000 on our @Hacker0x01 submission for a SSRF bug discovered in collaboration with @Shlibness! 💰🎉 🥳 We uncovered a Critical SSRF vulnerability, turning it into unauthorized access to internal admin endpoints, leading to PII leaks and administrative access! Here’s how we escalated a simple SSRF to a $20,000 bounty. 💰🛡️ 🔍 Step-by-Step Breakdown: 1️⃣During our testing, we found an endpoint accepting an "url" parameter. 2️⃣To confirm it was vulnerable to SSRF, we passed a Burp Collaborator URL and received an HTTP pingback, indicating a potential SSRF issue. ✅ 3️⃣We then attempted to escalate this Issue by accessing localhost and AWS metadata. 4️⃣It turned out the endpoint was part of an AWS Lambda function. By hitting http://localhost:9001/2018-06-01/runtime/invocation/next, we retrieved Lambda function details. 💡 5️⃣At this point, there were no sensitive credentials or Information leaked. But since the SSRF allowed partial read, we wondered: "What if we could access internal services whitelisted for this Lambda?" 🤔 6️⃣Next, we identified two categories of targets across all subdomains: Externally resolving but not directly accessible via HTTP Internally resolving and obviously not accessible via the Internet🌐 7️⃣We used Shub's @infosec_au Surf tool ( for discovering potential Internal targets and found 5000+ viable subdomains that were inaccessible from the internet. 🎯 8️⃣Chaining the SSRF further, we searched for Swagger endpoints on all these targets Identified by the surf tool, we ended up looking for endpoints like: http:///swagger-ui/swagger.json http:///api/v1/api-docs http:///api/v2/api-docs etc We discovered that the Lambda function had whitelisted access to internal hosts exposing Swagger API documentation. 🚀 9️⃣The Swagger docs revealed administrative endpoints. Chaining the SSRF again, we accessed these Internal API endpoints, leading to PII leaks and unauthorized access to other internal administrative functionalities. 🔓 ⚠️ Impact: This vulnerability allowed attackers to access internal administrative endpoints, leaking PII and exposing other critical business risks. 🚨 💡Lesson Learned: Don’t stop at confirming SSRF! Always think outside the box and explore ways to escalate for maximum impact. Creativity wins the game! 🧠✨ #BugBounty #HackerOne #BugCrowd #YesWehack #Intigriti #bugbountytips #security Y
Tweet media one
4
1
210
@Shlibness
Shlomie Liberow
3 months
When you build a web crawler and it finds a very short root to the the FBI
Tweet media one
1
0
7
@Shlibness
Shlomie Liberow
3 months
@hakluke I've not had it work autonomously all the way not least because it's not truly necessary to use AI for parts of the flow that are fairly structured but I did have luck with AI finding a specific endpoint I needed based on historical context I fed in that led to a recent critical.
0
0
0
@Shlibness
Shlomie Liberow
3 months
@shaoruu @cursor_ai It has a tendency to randomly delete comments left in code even when I specify not to do this via 'rules for AI'
0
0
0
@Shlibness
Shlomie Liberow
3 months
Took the plunge and started blogging about bug bounties - my first post is live! AI can be a powerful tool for bug hunting at speed when combined with human intuition. Feedback most welcome!
9
27
119
@Shlibness
Shlomie Liberow
3 months
RT @RachelMoiselle: Here is one of the pogromists. He explicitly says he is going on a Jew hunt and curses the Jews. Jews. Not ‘Maccabi…
0
599
0
@Shlibness
Shlomie Liberow
4 months
A must watch by @Blaklis_ covering some funky bug bounty exploits with all the juicy details.
0
43
179
@Shlibness
Shlomie Liberow
4 months
0
0
2