About Course
Description
This course introduces students to the Bug bounty concepts associated with Web application pentesting. We encourage you to take this course if you are a beginner in the API bug bounty world. This course uses a custom-developed vulnerable web application pentesting to demonstrate how web vulnerabilities can be identified and exploited. This course teaches you how to identify a variety of web vulnerabilities lies in the Server-side, Client-side.
Course Content
- Road map & Report Writing
- Burp suit Advance Techniques
- Practical Recon Techniques
- Practical Recon techniques (Manual + Automation)
- Subdomain Finding
- Rate Limit Bypass.
- Authentication bypass
- CSRF
- Third-party password token Leakage
- File Upload Bugs
- Parameter Tampering
- Sensitive Token in URL
- OS (Command) Injection
- DMARC and SPF
- Clickjacking
- Broken Authentication
- CORS
- WordPress pentesting
- Key Exploits
- Jira Misconfiguration
- Email, Password or delete Account Validation
- Information Disclosure
- Long password Dos attack
- Web Cache Deception Attack
- URL Redirection
- Host header Attacks
- LFI & RFI
- IDOR
- SSRF
- XSS (Blind, Stored, Reflected)
- HTML Injection
- Subdomain Takeover
- CVES +Types of exploits
- 2Fa Bypass
- Exif Metadata
- Business Logic Errors
- Google Dorks
Benefits :
- Get ISO Certified Certification
- Get Bug Bounty Hunter badge
- Live targets to hunt
P.S: It takes minimum 3 months to get hard copy of ID card
Course Content
Join WhatsApp Group To Study
-
Join WhatsApp Group
00:00