OUR
BLOG

13 Jun 2018

Bypassing Cloudflare WAF to get more vulnerabilities

Hey guys, If you have been doing penetration testing or bug bounties for some time now, then you must have come across applications which uses Cloudflare as their Content Delivery Network(CDN). As a new bug bounty hunter or penetration tester, you must be feeling kind of frustrated when any XSS Payload you provide leads to […]

Read more
30 Apr 2018

IDOR to change the email notifications of user

Hey guys. Welcome to this new post from ENCIPHERS. Recently we have been writing a lot about bypass of different access controls and in the recent pentest conducted by our team, we again got some medium priority vulnerabilities regarding horizontal access bypass. And we will be discussing what was the vulnerability and how we proceeded […]

Read more
30 Apr 2018

Doing Subdomain Enumeration the right way

Hey guys. Welcome to this new post from ENCIPHERS. For the last few months, we have been continuously writing about different Findings and the approach our team took to find those. But there was one thing, which we wanted to share and that was the very first step itself. Be it bug bounties or Penetration […]

Read more
14 Mar 2018

Bypassing Access Control to see the private videos of an user

Hello security professionals. In the last post, we talked about the XSS finding in the recent penetration test conducted by our company ENCIPHERS. Here is a link to that post. In the same penetration test, we found another vulnerability which was really an interesting one. But first thing’s first, if you are not sure about […]

Read more
14 Mar 2018

How self XSS got turned into an stored XSS ?

Hey everyone. Our company ENCIPHERS recently conducted a penetration test for a certain client XYZ and in this post, we will be sharing my XSS finding which was among the most critical vulnerabilities we found in the application. The client here was a very reputed company which works in the field of video creation and […]

Read more
03 Mar 2018

Our three favorite burp suite extensions and how to use them

Hey there. In this post, we will be talking about some of the most popular Burspuite extensions and the different features about them. If you have been doing penetration testing for some time you must be already knowing that Burpsuite is the best tool a web application penetration tester can have. There is already a […]

Read more
27 Jan 2018

Subdomain Takeover

Hello, everyone. We have talked a lot about the TOP 10 web application vulnerabilities by OWASP in the other posts. This time we are going to learn something new which is being quite a common submission in the recent bug bounty reports. The vulnerability which we will discuss is Subdomain Takeover and we will see […]

Read more
25 Jan 2018

How to exploit XXE vulnerabilities?

Hi everyone. In this blog, we are going to discuss a critical web application vulnerability known as XML External Entity vulnerability also known as XXE. XXE is at the 4th position of the OWASP TOP 10 vulnerabilities in 2017. What is XXE actually? XXE vulnerabilities are used to exploit how an application parses the XML […]

Read more

Want to know anything about Enciphers or how we work?