Bug Bounty Hunting ( Real World Scenarios )
About Course
BUG BOUNTY TRAINING
Description
This course introduces students to the Bug bounty concepts associated with Web application pentesting. We encourage you to take this course if you are a complete beginner in API bug bounty world. This course uses a custom-developed vulnerable web application pentesting to demonstrate how, web vulnerabilities can be identified and exploited. This course teaches you how to identify a variety of web vulnerabilities lies in the Server-side, Client-side.
Course Content
- Roadmap & Report Writing
- Burp suit Advance Techniques
- Practical Recon Techniques
- Practical Recon techniques (Manual + Automation)
- Subdomain Finding.
- Rate Limit Bypass.
- Authentication bypass
- CSRF
- Third party password token Leakage
- File Upload Bugs
- Parameter Tampering
- Sensitive Token in URL
- OS (Command) Injection
- DMARC and SPF
- Clickjacking
- Broken Authentication
- CORS
- WordPress pentesting
- Key Exploits
- Jira Misconfiguration
- Email, Password or delete Account Validation
- Information Disclosure
- Long password Dos attack
- Web Cache Deception Attack
- URL Redirection
- Host header Attacks
- LFI & RFI
- IDOR
- SSRF
- XSS (Blind, Stored, Reflected)
- HTML Injection
- Subdomain Takeover
- CVES +Types of exploits
- 2Fa Bypass
- Exif Metadata
- Business Logic Errors
- Google Dorks
Benefits :
- Get ISO Certified Certification
- Get Bug Bounty Hunter Badge ( ID CARD )
- Live Targets to hunt
(Sample)
Point To Be Noted :
It takes minimum 3 months to get hard copy of ID CARD
Course Content
Introduction to bug bounty
-
Join Whatsapp Group
00:00