Author: Blogger

I am the one who publishes all the blogs for ENCIPHERS :-)
01 Feb 2019

By Hackers, for Hackers

On 16th-DEC-2018, ENCIPHERS conducted a full day training on “Web Application Hacking – Advance Level” as a part of “The Art Of Hacking” training series. The seats in the training were kept limited, to ensure a good trainer to student ratio.

To enable the students understand the advance web hacking concept in the training, all the attendees and trainers were connected via a private slack group so that they can learn from the content shared, ask queries and sharpen the basics . In this class room training attendees were given access to our custom virtual private server, Bughunters VPS and were provided with multiple guides and Hackers mind map.

The full day training was filled with lots of advance hacking concepts and demonstrations. Post training, we received huge applause from the attendees on various social media platforms. Have a look at some of those tweets:

Following the same approach, but after several enhancements to the course content, Bughunters VPS and training duration. We are launching “Web Application Hacking – Advance Level 2.0

24 Jan 2019


We Conducted the Web Application Hacking – Advance level training on 16th DEC 2018. Right after completing the training, we received amazing positive feedback: 


You can also read a post by one of the student, who won several bounties just hours after the training. MY EXPERIENCE OF THE ART OF HACKING TRAINING, AND THE STORY OF FIRST CRITICAL FINDING

We also received several inquiries regarding the next date of the training, from many who were not able to register last time. So keeping these things in mind, we worked more on improving several things:

  • Two day training agenda, comprising of several real world vulnerabilities and exploits instead of one day as it was in the last training. 
  • An improved version of Bughunters VPS, more tools, more secure, more powerful
  • A real world application like, lab environment, specifically created for this training.

So, now we present to you WEB APPLICATION HACKING – ADVANCE LEVEL 2.0, a two day classroom based training, focused on advance level exploitation of web application vulnerabilities.

Details about the training

Training name : Web Application Hacking – Advance level 2.0

Training Agenda : Agenda of Web Application Hacking-Advance level 2.0

Training date: 30th – 31st March 2019

Training Timing: 9:00 AM – 5 PM

Training Venue: New Delhi, India (Exact venue to be shared with registered students)

Training Fee: 

  • Classroom based training (Without VPS access): 15,000 INR + 18% GST [Final cost: 17,700 INR]
  • Classroom based training + One month access to Bughunters VPS: 20,000 INR + 18% GST [Final cost: 23,600 INR]

Only for students outside New Delhi – NCR, India region: [Only 10 seats available]

  • Online access to the training (virtual conferencing): 17,000 INR + 18% GST [Final cost: 20,060 INR] 
  • Online access to the training + One month access to Bughunters VPS: 22,000 INR + 18% GST [Final cost: 25,960 INR]

Unique benefits of this training:

2 days classroom based training on Advance level attacks on real world application specifically designed for training students.

Confirm enrollment to free Basic level training (online).

100% discount coupon for the online course: Web Application Penetration Testing Using Burp Suite.

One month access to completely customized VPS (Virtual Private Server). Attendees can use this server to do bug bounties or perform penetration testing. (Optional)

Detailed guides for all the tools on Bughunters VPS.

Hackers mind map: to help you understand what all things should be tested and how to proceed at each level.

Super cool training completion certificate by ENCIPHERS.

Access to private slack channel: ask doubts and questions. 

How to enroll for this training:

  1. Complete the payment:
    1. UPI: enciphers@icici
    2. IMPS/NEFT:
      1. Bank Name: ICICI Bank Ltd
      2. Acc No: 628205025182
      3. Account Name: ENCIPHERS
      4. IFSC: ICIC0006282
  2. Fill the google form here: Google Form
    1. Make sure to chose training mode you selected.
    2. Make sure to submit the transaction details (Transaction number etc)


For any inquiry contact us at: artofhacking[at]enciphers[dot]com

Join the Slack group of The Art Of Hacking:  Join us on Slack: Slack Invite Link

For corporate training and other inquiries: hello[at]enciphers[dot]com

02 Jan 2019

My experience of The Art Of Hacking training, and the story of first critical finding

Hey folk,

I am Jayesh patel. Little bit of $whoami:  I am a bug hunter who is highly motivated towards the field of Web, Mobile application Security and I actively participate on various Bug Bounty Programs/Platforms like Bugcrowd, Hackerone,,


Why am I writing this blog post ?

ENCIPHERS team asked me about my experience of basic and advanced level training in The Art Of Hacking series, and asked if I would be interested to share my experience through a post. 

So I said yes!!! and here i am writing blog about some of my findings, which I discovered after taking advance level training from ENCIPHERS.

Before the advance level training, I was only able to find the vulnerabilities which were of low-severity but after the training, I found my first critical vulnerability within hours. 

So the journey started on 29 September 2018, when ENCIPHERS team conducted a free training  “The Art Of Hacking: WEB APPLICATION HACKING – BASIC LEVEL“.  The training was awesome, I  learned lot of things to improvise in bug bounty hunting.  ENCIPHERS team also helped me in finding a vulnerability on a web application which I was trying to hack (under a responsible disclosure program).


After The Art Of Hacking – Basic Level training, ENCIPHERS team announced about The The Art Of Hacking: WEB APPLICATION HACKING – ADVANCE LEVEL and I Registered for the training. The advance level training was conducted on 16 December 2018, at Vivanta By Taj, New Delhi. This time, it was about advance and critical vulnerabilities like RCE, SQLI, SSRF, XXE  etc.


On the day of training, it started with setting up our access on a virtual private server,  Bughunter’s VPS and we were provided with multiple guides (PDFs). One of the other interesting thing was a Hacker Mind-Map designed by ENCIPHERS team.  The Hacker Mind-Map is a detailed flow of steps which one can follow while doing bugbounties or penetration testing. The Bughunter’s VPS was already setup with multiple bug bounty related tools, and a Tools and Usage guide  was also provided. This helped me a lot in finding bugs, just by recon only. The Mind-Map explained, how someone should start with testing a target, and what are the possible tests to do at each stage. 

In the training, we learned about many advance level vulnerabilities, and exploited them in a test application (by taking remote shells and dumping databases). 

Story of my first critical bug:

After the training, while I was returning back to my hometown, I had a few hours on the train station. So I thought of doing some bug hunting using the concepts from training.

So, I choose a target and first thing I learned in training was to understand the scope properly. This was a target with sub-domains included, so I started using my Bughunter’s VPS and discovered all the sub domains using Aqua-tone tool, which was already setup on the VPS. After that enumeration I started port scanning on all the sub-domains using Masscan tool on Bug Hunter VPS.

After scanning, I found that 5002 port was open on target site so I just opened that site on chrome.

Yeah…….!!! 🙂 😉

port was open and control panel login page was visible now my second task was to bypass the access control page so I just tried the default credential admin:admin.

After entering username and password I got access of control panel and yeah!!! that was my first critical bug and all thanks to ENCIPHERS team for this amazing training.



If you are into bug bounties or penetration testing and want to enhance your security skills, I would highly recommend a training by ENCIPHERS.

Once I reported the vulnerability to the target company’s email address, within 24 hours I got a response:

unnamed (4)unnamed (5)

At the end of this blog, I just want to post a picture of me from the training 🙂 Looking forward to more training by ENCIPHERS.



29 Oct 2018


About Conference
Bsidesdelhi is a event where professionals, experts, researchers, and InfoSec enthusiasts come together to discuss on information security.


Workshop highlights

This workshop was about High Impact Security Vulnerabilities in android and ios application.Workshop was focused on teaching how to test a mobile for some of the high impact security vulnerabilities and how to fix was having good mix of presentations ,demos and hands on practicals on a VPS which was provided to attendees.

and some of the Vulnerability case studies were discussed why they exist, how to test such issues and fix them.

It was an awesome experience with attendees and Thanks for joining the workshop.
Hope to see you at Advance Level Web Hacking a part of “Art of Hacking” Series on 16 dec want to join the workshop check out the enciphers blog post about Advance Web Hacking.

01 Oct 2018

Web Application Hacking – Advanced Level

Right after the completion of our first training “Web Application Hacking – Basic Level”, we announced the advanced level training.

  • Training Name: Web Application Hacking – Advanced Hacking
  • Training Agenda: Find it here: Agenda For Web Application Hacking – Advanced Level
  • Training Date: 16th December 2018
  • Training Venue: Vivanta By Taj, Dwarka, New Delhi
  • Training Fee (Inclusive of lab access and taxes): 12,000 INR
  • Unique benefits of this training: 
    • One day training on advanced level attacks on web applications.
    • One month access to a specifically designed virtual private server. Attendees can use this server to perform bug bounties on targets and submit reports. The VPS (virtual private server) will also have detailed guides on how to start the testing, how to use specific tools on those servers and how to submit reports and earn money.
    • Invite to two Q&A sessions to ask doubts and take help.
    • Access to separate channel for asking questions and taking help.


How to enrol for this training:

Screenshot 2018-09-29 at 10.54.28 PM

Screenshot 2018-09-29 at 10.53.33 PM.png


01 Oct 2018

“THE ART OF HACKING” First Training

On 29th September, 2018 Enciphers conducted a training on WEB APPLICATION HACKING – BASIC LEVEL as a part of the training series “The Art Of Hacking”


It was a full day hands on training where everyone got to learn about web application Hacking , how to start with bug bounties , write good reports , things that should be avoided while doing bug-bounties and the most important thing different approach of finding vulnerabilities with higher impact.

The training agenda was designed in such a way so that people just starting their career in web application security can understand the basic concepts and improvise as we move ahead to advanced concepts. All the attendees did hands on practical of some of the concepts, in a customised virtual machine provided. 

During the workshop attendees learned about the basics of web application, about DNS stuff , burp suite and Recon, how to find “easy money bugs” Where to look for bugs like XSS , CSRF, Access Control & improper session management issues, Insecure subdomain & hidden insecure files. In one of the module high paying bugs were covered where attendees learned about IDOR , MFA bypass, password reset issues, session management issues etc. There were lots of interesting test cases were shared with attendees, which were found in penetration tests done by Penetration testing team of ENCIPHERS.

Some of the pictures from the training session are below. Are you in these pictures? If not, then you should 🙂 


You can find some of the content used in this training here.

13 Sep 2018

The Art Of Hacking (Delhi Edition) : Web Application Hacking – Basic Level

We are excited to publicly announce the first session of “The Art Of Hacking”. Details are below:

Training Details:

Training Name: Web Application Hacking – Basic Level

Training Date | Time: 29th.September.2018 | 9:00 AM – 4:00 PM

Venue:  TO THE NEW, Tower B, 4th Floor, Logix Techno Park, Noida Express Way, Sector 127, Noida, Uttar Pradesh 201304.

Big thanks to “TO THE NEW” for helping us by providing the venue.


What’s so awesome in this training?

  • Free for all to attend.
  • Fully hands-on training, focusing on starting and succeeding in bug-bounties too.
  • It will be a live training with lab practice.
  • Attendees of Basic level will get discount for advance level training. 
  • Networking opportunity.



  • Working laptop with Kali Linux virtual machine.
  • Willingness to learn
  • (Optional) If you can get a personal wifi/internet connection, it would be better.


How to apply for this training?

  1. Fill the google form below (End of this page).
  2. As the seats are limited, we will chose majorly on who filled first criteria. So fill as soon as you can.
  3.  Wait for an acceptance email from our side with more details. Make sure to bring your ID and the invitation code we send in the acceptance email.


  • Enrolment start: 13th.September.2018
  • Enrolment ends: 19th.September.2018
  • Acceptance to be sent to attendees: 26th.September.2018


Agenda of the Training:

Module 1 – Basics of everything:

  • Basics of web applications
  • Vulnerability scanning
  • DNS and Domain level stuff
  • Intro to burp suite , Setting up & use cases

Module 2 – Recon:

  • What is recon? Best tools for recon.
  • Low severity issues and how to find them during recon.
  • Chaining low severity bugs to get higher impact.
  • Reporting low severity bugs the correct way.

Module 3 – Finding the “easy money bugs”:

  • Cross Site Scripting:
    • How to find? Where to look?
    • Using Burp suite for finding XSS
    • Interesting case studies of XSS
  • Cross site request forgery
  • Access control & Improper session management issues
  • Insecure subdomains & hidden insecure files

Module 4 – Finding high paying bugs:

  • Insecure Direct Object Reference
    • What are they?
    • Where do they exist?
    • Using burp suite to find IDORs
    • Case studies on interesting IDOR bugs
  • Authentication & Session related vulnerabilities:
    • MFA bypass
    • Password reset issues
    • Session management issues

Module 5 – How not to suck at bug bounties:

  • Reporting is the key to good money.
  • How to avoid duplicate issues?
  • Amazing resources from around the internet.
  • Where can you hunt other than Bugcrowd and Hackerone?


Want to know more about the whole series of trainings? Read here

Want to join the group? Have questions to ask? Join us on Slack: Slack Invite Link

Training Content/Hand-Outs:

  1. Presentation Used in the basic level training: (Presentation) The Art Of Hacking – Web App Basic Level
  2. Books/Resources:
    1. OWASP testing guide: OTGv4
    2. CORS POC sample: CORS_POC
    3. Web Application penetration Testing Checklist: Web Application Penetration Testing Checklist
    4. More resources to start in web app security:  Resources
  3. Virtual Machine (OVA file): OVA Link
  4. Virtual Machine Details VM Details
  5. Vulnerable App – WackoPicko Details
  6. Vulnerable App – OWASP Juice Shop:


Hope you loved the training. Please give your feedback here.

10 Sep 2018

The Art Of Hacking


A series of training focused on teaching practical penetration testing on Web and Mobile applications. These sessions are going to be hands on, classroom based, lab focused.

All the training are divided into Basic and Advance level.

How the first session will be organised?

  • The enrolment form for the first training will soon be launched together with the agenda of the training.

  • Interested attendees are required to fill the enrolment form after reading the description carefully.

  • From all the enrolments, we will confirm the enrolment according to the number of seats available. A confirmation email will be sent to those attendees with date and venue details.

  • Come and join us in the first training session 🙂

How the attendees will be selected?

Free Trainings:

  1. The first people to get access to the enrolment form will be from our Slack group (Join Here: Slack Group Invite).

  2. Next, the enrolment form will be made public and anyone can fill the form and enrol for the training.

  3. Once the time period for enrolment ends, we will get all the attendees details and send the confirmation one by one, on first come first serve basis.

  4. If, there are too many attendees left out after first training, we will make sure to schedule another training for those.

  5. The confirmation email will have all the details about venue and timing of the training.

Paid Trainings:

  1. A link will be shared to enrol for the training in the slack group first and then will be made public.

  2. Once the enrolment ends, we will share the confirmation mail with all the details.

Important Note:

If you have enrolled for free training and realize that you won’t be able to make it. Please send us an email at

If you fail to let us know and your seat goes empty in the training (because we won’t be able to give it to someone else), we will not be able to select you for any future training. Obviously, people with emergency or valid reason for not being able to attend the training, will be an exception.

Who will be the trainer?

Trainer Name: Abhinav Mishra

LinkedIn Profile: Link

Trainer’s bio: Abhinav has around 7+ years of experience in Information Security, penetration testing and hacking. You might have seen him giving trainings in several information security conferences and meet ups. Some of the recent training are: co-trainer in BlackHat USA 2018, BsidesDelhi 2017.

Abhinav is the founder and head of security operations at ENCIPHERS. He is also one of the Research Advisory Board member for Cobalt Core, where he also leads the penetration tests. One of the Synack Research team member, have won several accolades, bug-bounties and Hall of Fame. As much as he loves hacking, he loves giving training too.  You can find him on twitter @0ctac0der.

NOTE: Keep checking this page regularly, we will very soon publish the enrollment form for the first training.

02 Sep 2018

Finding and exploiting Blind XSS

Hey guys. Welcome to this new post from ENCIPHERS. If you are here, we are already presuming that you know what XSS is and the major types of XSS(i.e Reflected and Stored). Plus there is DOM-based XSS too which is not that common as those other two. We have discussed in great depth about the different types of XSS and how to exploit them in different scenarios(like file uploading or markdown feature). You can always take a look at our blog section to go through them. But today, we have something special for you. If you are a beginner and you haven’t heard about Blind XSS, or you know about Blind XSS but do not understand how to exploit them, then this post will definitely help you as we will explain everything you need to know about Blind XSS.


Blind XSS is a variant of the so-called “Stored XSS” but you cannot know by ordinary means that if your payload got executed like you can in case of Stored or Reflected XSS where the alert box popups immediately on the screen. Consider a simple scenario. You are putting XSS payloads in an input field, but nothing happens on screen. Now, what happens is that the admin of the application is getting the same input directly and your payload gets executed there(i.e on his account). But you have no way to know where does the payload get executed or even if it gets executed. That is why it is called Blind XSS because you can’t see that little alert box of yours because it may be getting executed somewhere else or on a completely different domain altogether.

Where to look for Blind XSS?

You should always put Blind XSS payloads in places, where you are certain that an admin or another user of higher privileges will definitely go through that. As for example, the Feedback page. Thinking logically, a normal user of the application won’t review your feedback but it will most probably be reviewed by an admin or a team member. So that’s a nice place for a little surprise. Another place where you could use Blind XSS payloads,

  1. Review forms
  2. Contact Us pages
  3. Passwords(You never know if the other side doesn’t properly handle input and if your password is in View mode)
  4. Address fields of e-commerce sites
  5. First or Last Name field while doing Credit Card Payments
  6. Set User-Agent to a Blind XSS payload. You can do that easily from a proxy such as Burpsuite.
    And there are many more cases, but we would encourage you to read some reports to get a perfect knowledge, where other hackers are already applying these techniques and how you can use them in your program.

How to find Blind XSS and what are the appropriate tools for this purpose?

Finding Blind XSS isn’t that hard as it sounds and sometimes putting your payloads everywhere can work like a charm. But let’s see how to approach this methodically.
There are awesome tools available for this purpose, but the most popular and the one which we regularly use in penetration tests and bug bounties is XssHunter. It’s specifically written for finding Blind XSS’s and it’s really easy to make it work.

    1. First of all, you need to signup for XSSHunter from this page.
    2. Now if you go to the Payloads section here you will see there are different payloads with the proper description on where you could use them.
    3. Next step is to just simply copy and paste these payloads and start inserting them in different fields as we already told you before(contact us, feedback, address etc).
    4. Once done, you can just sit down and check your XSS Fires tab at a later time. If the payload gets executed anywhere it will give the full details of the bug and will also mail you a report which is super helpful.

In case, it’s not working, you can also tweak with those payloads. Url encoding and double encoding are also some of the other options which can work like a charm.

There are other tools available also, like ezXSS or you can even write your own tool with your domain(but only when you become an advanced tester). For more exposure to Blind XSS, just use this Google Dork blind xss and you will get the full list of publically disclosed reports on Hackerone. Go through each of them to understand how you can make it work efficiently. Until then, you can start inserting these Blind XSS payloads from XSShunter and play around them in your future pentests or bug bounty programs and see for yourself how it works out for you.

All the best and Happy hacking.!!

22 Jun 2018

Doing RECON the correct way

Hey guys, today we will discuss Information gathering aka Recon which is the foundation of every bug bounties or penetration tests which you will ever do. Many security researchers have found many CRITICAL and HIGH priority bugs just by doing proper information gathering which is the initial phase of a penetration test.

If I get 6 hours to chop a wood, I would spend the first 4 hours sharpening my ax.

This is exactly the case in this phase. Most of the researchers just start looking for vulnerabilities like XSS, CSRF, IDOR as soon as they get the target but with proper information gathering at the start people can know what the target is and the different technologies on which it is built and several other things. For now, we will keep this post general and simple and with time we will make sure to update it or write the 2nd part of it. So let’s get started on what you should do in the initial phase of knowing your target.

  1. Subdomain Enumeration:

    We have already published a post on Subdomain Enumeration in which we discussed several tools and techniques by which you could do subdomain enumeration. You can find the post here. In the time we last wrote that post, we came across some other cool tools which are much faster and bring better results when you have a target like * and you need to enumerate all the subdomains.


    One of these tools is Subfinder. You can get the tool from here. It is faster than Subbrute or Sublist3r. It has been written in Go language so you will need to follow the instructions to install Go and setup this tool on your machine. Also, you will need to set up private API keys for some of the services like Virustotal to get results from them also. It has been mentioned in brief on that Github page. After installing the tool, there are several options which you can use. One of our favorites is:

    ./subdinder -d

    This will make sure to get subdomains from 22 passive data sources. But if you have a text file like this all.txt and you want to brute force the subdomains, then you can use the option below

    ./subfinder -d -b -w all.txt

    Subfinder is one of the fastest and mostly used subdomain enumeration tools out there recently. Make sure to use it to get juicy subdomains to gain more chances of getting a bug there.


    Amass is the second new tool which is there and we wanted to let you know in case you haven’t used it yet. It has also been written in Go and is super fast. Installation instructions and everything else which you will need can be found here.

    After installation, you can simply run the command:

    amass -d

    to get different subdomains for that target. There are many other different flags mentioned there which can help you in finding a quality number of good subdomains. Now if you are thinking, why we are talking about subdomain enumeration tool once again, and Subbrute or Sublist3r would suffice this purpose. Then we would like to add something, as of now Sublist3r has really become depreciated as a tool and you will find a great difference when you compare the results from Subfinder and Subbrute or Sublist3r. Make sure to try these 2 tools to have better chances of finding a different domain and ultimately getting a valid bug on that.

  2. Censys:

    Now, this is one tool which many researchers have been focussing on in recent years. And this is one of the coolest tools for information gathering. Censys actually scan the IP addresses and gathers information from a set of different ports. Creativity is a way while doing Censys search. A simple search like this, “” internal might lead to unexpected results. There are many tutorials online available on how to get more than the normal information usually shown and you should really check that out. You can access the tool from here. Just enter any website’s name in the Search Box and you will get a whole lot of results and many times subdomains data from there. Do take a look at it while doing information gathering.

  3. Shodan:

    Shodan is more or less the same as Censys except that it scans every IP addresses and generate a lot of data. The process is also almost the same and is really popular among bug bounty hunters. You can access the tool from here. There are many books like this and online tutorial plus videos which goes into a deep study on different shodan techniques to get better results. Again creativity is the key here, so do gather some information on Shodan before gathering info on the target application. So do check this one out.

  4. Github:

    Github is the world’s largest software development platform. It is one of the best places to look for various issues and knowledge about the technology stack the company is making it’s products on.
    While doing a Github Recon for a particular target, you could look for many things like:

      • Looking for secret keys labeled as API_key and AWS_Secret
      • Some internal credentials such as username, the password for Database or admin portals.
      • You could also get some different API endpoints and look for different domain patterns.
      • Not only this, there are many environments like dev, stage, and prod and you may find some interesting details or any interesting subdomain based on this.
      • Let’s suppose the testing application is, then you could just make a search as
        “” “dev” or “” “prod” to look for the above details.
        For searching secrets like API_key, you can just make a search as “” API_key and it might give you some unexpected results in many cases.
        Similarly, if you want to refine your searches for passwords, you should make a search for “” password


    There are many tools available for Github Recon like gitrob, git-all-secrets etc, but the best way will be to do it manually so you don’t miss anything important.

  5. Amazon Web Services(AWS):

    AWS s3 buckets are being used by a lot of companies to host their content nowadays. But many times unsecured methods leave them misconfigured which could then be an asset to a malicious hacker. In a CRITICAL scenario, this misconfigured s3 bucket may allow an attacker to read and write files on a bucket belonging to the company. Just as for finding any ‘juicy’ information on Github, it is also possible to get a good amount of information while doing AWS recon.

    Some of the ways can be like to use a Google Dork. Let’s say the target is then a google search like +
    may provide you with some interesting results.
    It is also possible to get s3 buckets on Github, so in this case, you may provide a search query in Github such as:
    “” + “s3”

So this is all for this first post on Information Gathering. There are many other methods like dig command and which can be also helpful for getting various types of information. Information gathering is just what the name says. Gathering information from anywhere. Even though if you don’t find any sensitive file during Recon, knowing the technology stack, subdomains will definitely give you an upper hand in the latter half of pentesting. In the upcoming months, we will make sure to make a part 2 for Information Gathering where we will talk about some of these topics in depth or add new updated tools and methodologies to help you in your penetration testing career.

Until then, keep practicing and Happy hacking. !!