WAPT (Web Application Penetration Testing)
About Course
Web Application Penetration Testing
Description
This course introduces students to the WAPT concepts associated with Web application pentesting. We encourage you to take this course if you are a complete beginner in API bug bounty world. This course uses a custom-developed vulnerable web application pentesting to demonstrate how, web vulnerabilities can be identified and exploited. This course teaches you how to identify a variety of web vulnerabilities lies in the Server-side, Client-side.
Course Content
- Roadmap & Report Writing
- Burp suit Advance Techniques
- Practical Recon Techniques
- Practical Recon techniques (Manual + Automation)
- Subdomain Finding.
- Rate Limit Bypass.
- Authentication bypass
- CSRF
- Third party password token Leakage
- File Upload Bugs
- Parameter Tampering
- Sensitive Token in URL
- OS (Command) Injection
- DMARC and SPF
- Clickjacking
- Broken Authentication
- CORS
- WordPress pentesting
- Key Exploits
- Jira Misconfiguration
- Email, Password or delete Account Validation
- Information Disclosure
- Long password Dos attack
- Web Cache Deception Attack
- URL Redirection
- Host header Attacks
- LFI & RFI
- IDOR
- SSRF
- XSS (Blind, Stored, Reflected)
- HTML Injection
- Subdomain Takeover
- CVES +Types of exploits
- 2Fa Bypass
- Exif Metadata
- Business Logic Errors
- Google Dorks
Benefits :
- Get ISO Certified Certification
- Get WAPT ( ID CARD )
- Live Targets to hunt
(Sample)
Point To Be Noted :
It takes minimum 3 months to get hard copy of ID CARD
Course Content
Join WhatsApp Group
-
Join WhatsApp Group To Study
00:00