Web App Security

Our Latest Research Around Web Application Security, Tools, Attacks, Insights and Resources
Web App Security
September 8, 2018

Finding and exploiting Blind XSS

If you are here, we are already presuming that you know what XSS is and the major types of XSS(i.e Reflected and Stored) …
Web App Security
June 22, 2018

Doing RECON the correct way

Hey guys, today we will discuss Information gathering aka Recon which is the foundation of every bug bounties or penetration …
Web App Security
June 18, 2018

How can Expired URLs lead to an all-new kind of vulnerability?

Hey guys. Actually, this is the 2nd part of the vulnerability which we discussed in the earlier post. You can read that post…
Web App Security
June 13, 2018

Bypassing Cloudflare WAF to get more vulnerabilities

Bypassing WAF (Web Application Firewall) Hey guys, If you have been doing penetration testing or bug bounties for some time…
Web App Security
June 6, 2018

A User can change the personal details of any other user broken access control

Broken Access Control Hi everyone. Welcome to this new post from ENCIPHERS. So recently, our team at ENCIPHERS conducted …
Web App Security
April 30, 2018

IDOR to change the email notifications of user

IDOR Hey guys. Welcome to this new post from ENCIPHERS. Recently we have been writing a lot about bypass of different access...
Web App Security
April 30, 2018

Doing Subdomain Enumeration the right way

Hey guys. Welcome to this new post from ENCIPHERS. For the last few months, we have been continuously writing about different…
Web App Security
March 14, 2018

Bypassing Access Control to see the private videos of a user

Hello security professionals. In the last post, we talked about the XSS finding in the recent penetration test conducted by…
Web App Security
March 14, 2018

How self XSS got turned into a stored XSS?

self XSS Hey everyone. Our company ENCIPHERS recently conducted a penetration test for a certain client XYZ and in this post...