Tib3rius
@0xTib3rius
Web App Hacker @NetSPI | Educator | Content Creator | UwU-Anointed Wapp King | Ex-Brit | http://linktr.ee/tib3rius (he/him) 🇺🇸 A mostly unserious person.
🚀 Catch me online! 🚀 🎥 YouTube: youtube.com/Tib3rius 💻 Twitch: twitch.tv/0xTib3rius 📱 TikTok: tiktok.com/@0xtib3rius 🔗More links: linktr.ee/tib3rius 🌐 Let’s connect!
If travel sickness is an illness caused by travelling, why isn't home sickness an illness caused by being at home? 🤔
Just had a marathon ~2hr planning session for "Aw, man...pages!", my DEF CON software documentation quiz show. Y'all screwed on some of these questions. 😅 Come prove me wrong: Aug 8, 10am, Contest Stage. hackertracker.app/event/?conf=DE…
I'm waiting for @Xbow to actually impress me by finding vulnerabilities that are notoriously difficult for standard automation to find. The big two examples are business logic flaws and authorization issues. I would also love to know how much one of their scans costs them. 🤔
"most tools would have given up" "A master class on path traversal exploitation" "the vulnerable endpoint permitted local file access via the file:// scheme" "/photo/proxy?url=file:///etc/passwd" ... 🤣🤣🤣 The marketing is the most impressive thing here.
.@TheRealC3rul34n sent me this after I was telling her about my SharePoint struggles + success. She gets me. 🥰

Facts. 6 hours of my life at least yesterday with ChatGPT as my troubleshooting buddy. It was convinced I'd downloaded a bad ISO 3 times, but no it's just SharePoint not working the way it should.
The flex here is installing a working version of SharePoint and not the calc pop.
OMG. Metasploit worked. Which means...MY SETUP WAS OK. MOM I ACTUALLY INSTALLED A SHAREPOINT SERVER. POPPED CALC.EXE LIKE A REAL LIFE HAXOR!!!
Calling it, for now. New found respect for Windows Sysadmins, I do not understand how y'all stay sane. If anyone has a working PoC and wants to collab for a video, lmk. I'll likely record a small one tomorrow evening and go over the basics of what we do know about the exploit.
"most tools would have given up" "A master class on path traversal exploitation" "the vulnerable endpoint permitted local file access via the file:// scheme" "/photo/proxy?url=file:///etc/passwd" ... 🤣🤣🤣 The marketing is the most impressive thing here.
⚡️XBOW found LFI where most tools would have given up. Photo download endpoint blocked all path traversal attempts. But JavaScript analysis revealed /photo/proxy?url= - vulnerable to file:// scheme access. Successfully read a password file via proxy endpoint. Technical…
I have ~1000 of these stickers to give out at Hacker Summer Camp. 🤓 Come get one!

Smelly has spoken.
Hello, Someone please hire @endingwithali. She is currently looking for a job in software engineering. She is a very nice lady. Thank you.
Not sure which hacker con to go to? I break down my favorites, sharing pros, cons, personal stories, and tips for finding local events. Whether you're planning your first con or just looking for a new one to try, this guide is for you! Watch now! youtu.be/QOtRBA2H72o Thanks…

I don't know who needs to hear this today, but if you hold down Ctrl in Windows Task Manager, it pauses the automatic live-sorting of the table so you can click on the correct process. 👍
Sad that there is seemingly no sticker contest this year. DEF CON is the largest hacker sticker trading convention in the world. 🥲 Also fill out the Feet Feud survey pls: forms.gle/e8pP6FutqduusA…
Yo @InfosecStickers is there a sticker contest this year? Or is someone else hosting it? I have heard nothing... I have a sticker I have yet to reveal publicly that I want to submit. Otherwise I guess I can just share it. 😅
Calling it, for now. New found respect for Windows Sysadmins, I do not understand how y'all stay sane. If anyone has a working PoC and wants to collab for a video, lmk. I'll likely record a small one tomorrow evening and go over the basics of what we do know about the exploit.
Have tried this exploit: github.com/soltanali0/CVE… No dice. Either my setup is janky (possible), the payload generation isn't working properly (using ysoserial.net tho) or the exploit is missing stuff. 🤔
Watch this so I can go to DefCon via your collective subconscious youtu.be/bamz9Ozj6II?fe… (ft. @0xTib3rius 😜)
At the end of Scooby Doo when everyone is @_JohnHammond
Hanging with the gang at @HuntressLabs Summer Summit ☀️🍸 @0xffaraday , @wbmmfq , @JSemonSecurity , let the doxxing begin …