Bug Bounty And Vapt Course [Will Make Uh Pro & Rich] 2023
Published 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.40 GB | Duration: 2h 31m
Published 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.40 GB | Duration: 2h 31m
Perfect Guide For Making Uh A Noob To Pro Bug Hunter 2023
What you'll learn
Complete Knowledge Of Bug Bounty
Advanced Website Testing
Experienced VAPT Course
Hunt For Multiple Bugs And Get Bounties
FIle Upload Vulnerabilities
OAuth
Business Logic Vulnerabilities
Broken Authentication
Access Control Vulnerabilities
Directory Traversal
OS Command Injection
SSRF
XXE
CORS
SQL Injection
Information Disclosure
XSS
CSRF
Requirements
Stable Internet Connection
PC/Laptop
Basic Knowledge Of Computer
Eagerness To Boost Your Career
Description
Welcome to my course on Bug Bounty And VAPT. This course assumes you are a complete beginner.This course is highly practical but doesn't neglect the theory, we'll start with basics to teach you how websites work, the technologies used and how these technologies work together to produce these nice and functional platforms that we use everyday. Then we'll start hacking and bug hunting straight away. You'll learn everything by example, by discovering security bugs and vulnerabilities, no boring dry lectures.The course is partitioned into various segments, each plans to show you a typical security bug or weakness from the OWASP top 10 most normal security dangers. Each part takes you through various involved guides to show you the reason for the security bug or weakness and how to find it in various situations, from easy to cutting edge. You'll likewise learn progressed methods to sidestep channels and safety efforts. As we do this I will likewise acquaint you with various hacking and security ideas, apparatuses and strategies. All that will be shown through models and involved practicals, there will be no pointless or exhausting talks!As mentioned you'll learn much more than just how to discover security bugs in this course, but here's a list of the main security bugs and vulnerabilities that will be covered in the course:FIle Upload VulnerabilitiesOAuthBusiness Logic VulnerabilitiesBroken AuthenticationAccess Control VulnerabilitiesDirectory TraversalOS Command InjectionSSRFXXECORSSQL InjectionInformation DisclosureXSSCSRFA Bonus Section on how to choose perfect programs, perfect report making, Follow up on triage and how to be calm and consistent.With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.Checkout the curriculum and the course teaser for more info!
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 How you can connect with me?
Lecture 3 Connect With me
Section 2: Setting Up Of Burp-Suite
Lecture 4 Download and Set up
Lecture 5 Configuration Of Burp Suite
Lecture 6 Basic Information about its working
Section 3: Functioning Of A Website
Lecture 7 Types of websites
Lecture 8 HTTP Responses
Lecture 9 Status Codes
Lecture 10 Discussing the structure of HTTP response
Section 4: OWASP
Lecture 11 What is its meaning
Lecture 12 Comparison of previous and new OWASP Lists
Section 5: About CVSS and Priority Levels
Lecture 13 CVSS Scores
Lecture 14 Priority Levels on Bug Bounty Programs
Section 6: XSS [Cross-Site Scripting]
Lecture 15 Types of XSS and its meaning
Lecture 16 How to hunt for reflected Reflected XSS
Lecture 17 How to hunt for stored XSS
Lecture 18 Brief about DOM-Based XSS
Lecture 19 Where to practise XSS Skills?
Lecture 20 Site To Practise
Section 7: CSRF [ Cross Site Request Forgery]
Lecture 21 Meaning Of CSRF?
Lecture 22 How to hunt CSRF?
Lecture 23 Advance CSRF techniques
Section 8: SQL Injection
Lecture 24 Types Of SQL Injection
Lecture 25 SQL injection vulnerability in WHERE clause
Lecture 26 SQL injection UNION attack
Lecture 27 Practising SQL
Section 9: CORS [Cross Origin Resource Sharing]
Lecture 28 Meaning
Lecture 29 Practice Of CORS
Lecture 30 Login Bypass
Section 10: XXE [XML External Entity]
Lecture 31 Meaning of XXE
Lecture 32 Practise Lab 2
Lecture 33 Practising XXE Lab 1
Section 11: SSRF [Server Side Request Forgery]
Lecture 34 Meaning of SSRF?
Lecture 35 Basic SSRF Lab
Lecture 36 Advance SSRF Lab
Section 12: OS Command Injection
Lecture 37 Meaning
Lecture 38 Practice Lab 1
Lecture 39 Practise Lab 2
Lecture 40 Practise
Section 13: Directory Traversal
Lecture 41 Meaning
Lecture 42 Practise Lab 1
Section 14: Access Control Vulnerabilities
Lecture 43 Meaning
Lecture 44 Practise Lab 1
Lecture 45 Practise Lab 2
Section 15: Broken Authentication
Lecture 46 Meaning
Lecture 47 Practise Lab 1
Lecture 48 Practise Lab 2
Section 16: Information Disclosure
Lecture 49 Meaning
Lecture 50 Error Message Information Disclosure
Lecture 51 Authentication Bypass by Information Disclosure
Section 17: Business Logic Vulnerabilities
Lecture 52 Meaning
Lecture 53 Practise Lab 1
Lecture 54 Practise Lab 2
Lecture 55 Practise
Section 18: OAuth Authentication
Lecture 56 Meaning
Lecture 57 Practise Lab 1
Lecture 58 Practise Lab 2
Section 19: File Upload Vulnerabilities
Lecture 59 Meaning
Lecture 60 Practise Lab 1
Lecture 61 Practise Lab 2
Section 20: More Learnings
Lecture 62 How to choose targets for bug bounty?
Lecture 63 Think Big - Hunt Big
Lecture 64 Effective report making
Lecture 65 Follow up on triage
Lecture 66 Most Imp Lesson [Stay Calm and Effective]
Students who want to gain knowledge,People trying to jumpstart their career,Aspiring Bug Bounty Hunter,Web Application Pentesters