Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Bug Bounty And Vapt Course [Will Make Uh Pro & Rich] 2023

Posted By: ELK1nG
Bug Bounty And Vapt Course [Will Make Uh Pro & Rich] 2023

Bug Bounty And Vapt Course [Will Make Uh Pro & Rich] 2023
Published 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.40 GB | Duration: 2h 31m

Perfect Guide For Making Uh A Noob To Pro Bug Hunter 2023

What you'll learn

Complete Knowledge Of Bug Bounty

Advanced Website Testing

Experienced VAPT Course

Hunt For Multiple Bugs And Get Bounties

FIle Upload Vulnerabilities

OAuth

Business Logic Vulnerabilities

Broken Authentication

Access Control Vulnerabilities

Directory Traversal

OS Command Injection

SSRF

XXE

CORS

SQL Injection

Information Disclosure

XSS

CSRF

Requirements

Stable Internet Connection

PC/Laptop

Basic Knowledge Of Computer

Eagerness To Boost Your Career

Description

Welcome to my course on Bug Bounty And VAPT. This course assumes you are a complete beginner.This course is highly practical but doesn't neglect the theory, we'll start with basics to teach you how websites work, the technologies used and how these technologies work together to produce these nice and functional platforms that we use everyday. Then we'll start hacking and bug hunting straight away. You'll learn everything by example, by discovering security bugs and vulnerabilities, no boring dry lectures.The course is partitioned into various segments, each plans to show you a typical security bug or weakness from the OWASP top 10 most normal security dangers. Each part takes you through various involved guides to show you the reason for the security bug or weakness and how to find it in various situations, from easy to cutting edge. You'll likewise learn progressed methods to sidestep channels and safety efforts. As we do this I will likewise acquaint you with various hacking and security ideas, apparatuses and strategies. All that will be shown through models and involved practicals, there will be no pointless or exhausting talks!As mentioned you'll learn much more than just how to discover security bugs in this course, but here's a list of the main security bugs and vulnerabilities that will be covered in the course:FIle Upload VulnerabilitiesOAuthBusiness Logic VulnerabilitiesBroken AuthenticationAccess Control VulnerabilitiesDirectory TraversalOS Command InjectionSSRFXXECORSSQL InjectionInformation DisclosureXSSCSRFA Bonus Section on how to choose perfect programs, perfect report making, Follow up on triage and how to be calm and consistent.With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.Checkout the curriculum and the course teaser for more info!

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 How you can connect with me?

Lecture 3 Connect With me

Section 2: Setting Up Of Burp-Suite

Lecture 4 Download and Set up

Lecture 5 Configuration Of Burp Suite

Lecture 6 Basic Information about its working

Section 3: Functioning Of A Website

Lecture 7 Types of websites

Lecture 8 HTTP Responses

Lecture 9 Status Codes

Lecture 10 Discussing the structure of HTTP response

Section 4: OWASP

Lecture 11 What is its meaning

Lecture 12 Comparison of previous and new OWASP Lists

Section 5: About CVSS and Priority Levels

Lecture 13 CVSS Scores

Lecture 14 Priority Levels on Bug Bounty Programs

Section 6: XSS [Cross-Site Scripting]

Lecture 15 Types of XSS and its meaning

Lecture 16 How to hunt for reflected Reflected XSS

Lecture 17 How to hunt for stored XSS

Lecture 18 Brief about DOM-Based XSS

Lecture 19 Where to practise XSS Skills?

Lecture 20 Site To Practise

Section 7: CSRF [ Cross Site Request Forgery]

Lecture 21 Meaning Of CSRF?

Lecture 22 How to hunt CSRF?

Lecture 23 Advance CSRF techniques

Section 8: SQL Injection

Lecture 24 Types Of SQL Injection

Lecture 25 SQL injection vulnerability in WHERE clause

Lecture 26 SQL injection UNION attack

Lecture 27 Practising SQL

Section 9: CORS [Cross Origin Resource Sharing]

Lecture 28 Meaning

Lecture 29 Practice Of CORS

Lecture 30 Login Bypass

Section 10: XXE [XML External Entity]

Lecture 31 Meaning of XXE

Lecture 32 Practise Lab 2

Lecture 33 Practising XXE Lab 1

Section 11: SSRF [Server Side Request Forgery]

Lecture 34 Meaning of SSRF?

Lecture 35 Basic SSRF Lab

Lecture 36 Advance SSRF Lab

Section 12: OS Command Injection

Lecture 37 Meaning

Lecture 38 Practice Lab 1

Lecture 39 Practise Lab 2

Lecture 40 Practise

Section 13: Directory Traversal

Lecture 41 Meaning

Lecture 42 Practise Lab 1

Section 14: Access Control Vulnerabilities

Lecture 43 Meaning

Lecture 44 Practise Lab 1

Lecture 45 Practise Lab 2

Section 15: Broken Authentication

Lecture 46 Meaning

Lecture 47 Practise Lab 1

Lecture 48 Practise Lab 2

Section 16: Information Disclosure

Lecture 49 Meaning

Lecture 50 Error Message Information Disclosure

Lecture 51 Authentication Bypass by Information Disclosure

Section 17: Business Logic Vulnerabilities

Lecture 52 Meaning

Lecture 53 Practise Lab 1

Lecture 54 Practise Lab 2

Lecture 55 Practise

Section 18: OAuth Authentication

Lecture 56 Meaning

Lecture 57 Practise Lab 1

Lecture 58 Practise Lab 2

Section 19: File Upload Vulnerabilities

Lecture 59 Meaning

Lecture 60 Practise Lab 1

Lecture 61 Practise Lab 2

Section 20: More Learnings

Lecture 62 How to choose targets for bug bounty?

Lecture 63 Think Big - Hunt Big

Lecture 64 Effective report making

Lecture 65 Follow up on triage

Lecture 66 Most Imp Lesson [Stay Calm and Effective]

Students who want to gain knowledge,People trying to jumpstart their career,Aspiring Bug Bounty Hunter,Web Application Pentesters