Home
About Us
Products
Services
Services
All Services
Cyber Security as a Service
Advanced Penetration Testing
Security Automation
Red Team Assessment
Cloud Security Review
Architecture Review
Training
Research
Contact Us
Pentest Pricing
Web App Security
Our Latest Research Around Web Application Security, Tools, Attacks, Insights and Resources
Web App Security
September 8, 2018
Finding and exploiting Blind XSS
If you are here, we are already presuming that you know what XSS is and the major types of XSS(i.e Reflected and Stored) …
Read More
Web App Security
June 22, 2018
Doing RECON the correct way
Hey guys, today we will discuss Information gathering aka Recon which is the foundation of every bug bounties or penetration …
Read More
Web App Security
June 18, 2018
How can Expired URLs lead to an all-new kind of vulnerability?
Hey guys. Actually, this is the 2nd part of the vulnerability which we discussed in the earlier post. You can read that post…
Read More
Web App Security
June 13, 2018
Bypassing Cloudflare WAF to get more vulnerabilities
Bypassing WAF (Web Application Firewall) Hey guys, If you have been doing penetration testing or bug bounties for some time…
Read More
Web App Security
June 6, 2018
A User can change the personal details of any other user broken access control
Broken Access Control Hi everyone. Welcome to this new post from ENCIPHERS. So recently, our team at ENCIPHERS conducted …
Read More
Web App Security
April 30, 2018
IDOR to change the email notifications of user
IDOR Hey guys. Welcome to this new post from ENCIPHERS. Recently we have been writing a lot about bypass of different access...
Read More
Web App Security
April 30, 2018
Doing Subdomain Enumeration the right way
Hey guys. Welcome to this new post from ENCIPHERS. For the last few months, we have been continuously writing about different…
Read More
Web App Security
March 14, 2018
Bypassing Access Control to see the private videos of a user
Hello security professionals. In the last post, we talked about the XSS finding in the recent penetration test conducted by…
Read More
Web App Security
March 14, 2018
How self XSS got turned into a stored XSS?
self XSS Hey everyone. Our company ENCIPHERS recently conducted a penetration test for a certain client XYZ and in this post...
Read More
Previous
Next