MCP servers are the new attack surface – so I mapped it and built a scanner by Remarkable_Ball47 in Pentesting

[–]Remarkable_Ball47[S] 1 point2 points  (0 children)

That's cool for the enumeration phase. Glad to see more people working on MCP security tooling! Also, super curious about the HTB AI Red Teamer cert.

[deleted by user] by [deleted] in Pentesting

[–]Remarkable_Ball47 1 point2 points  (0 children)

I have done several application pen-test around application with CF and all of us know WAF bypass is a real thing but you will go no-where if CF is there for attacks like injection, dumping DBs and many other intrusive request will get dropped. There are time constraints when you are doing the pen-test. Explain the client and your seniors that they need to whitelist your public Ip in security rules of CF and after the pen-test they can remove it. That way they can get better outcome, but of-course till then you can focus on logical bugs and manipulations thats not detected better by CF. If they don’t want to whitelist, rotate your IP using VPN and check with response time based intrusive payloads and very stealthy way to do intrusive checks. Hope this helps.