Published 1/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.40 GB | Duration: 2h 31m
Perfect Guide For Making Uh A Noob To Pro Bug Hunter 2023 What you'll learn Complete Knowledge Of Bug Bounty Advanced Website Testing Experienced VAPT Course Hunt For Multiple Bugs And Get Bounties FIle Upload Vulnerabilities OAuth Business Logic Vulnerabilities Broken Authentication Access Control Vulnerabilities Directory Traversal OS Command Injection SSRF XXE CORS SQL Injection Information Disclosure XSS CSRF Requirements Stable Internet Connection PC/Laptop Basic Knowledge Of Computer Eagerness To Boost Your Career Description Welcome to my course on Bug Bounty And VAPT. This course assumes you are a complete bner.This course is highly practical but doesn't neglect the theory, we'll start with basics to teach you how websites work, the technologies used and how these technologies work together to produce these nice and functional platforms that we use everyday. Then we'll start hacking and bug hunting straight away. You'll learn everything by example, by discovering security bugs and vulnerabilities, no boring dry lectures.The course is partitioned into various snts, each plans to show you a typical security bug or weakness from the OWASP top 10 most normal security dangers. Each part takes you through various involved guides to show you the reason for the security bug or weakness and how to find it in various situations, from easy to cutting edge. You'll likewise learn progressed methods to sidestep channels and safety efforts. As we do this I will likewise acquaint you with various hacking and security ideas, apparatuses and strats. All that will be shown through models and involved practicals, there will be no pointless or exhausting talks!As mentioned you'll learn much more than just how to discover security bugs in this course, but here's a list of the main security bugs and vulnerabilities that will be covered in the course:FIle Upload VulnerabilitiesOAuthBusiness Logic VulnerabilitiesBroken AuthenticationAccess Control VulnerabilitiesDirectory TraversalOS Command InjectionSSRFXXECORSSQL InjectionInformation DisclosureXSSCSRFA Bonus Section on how to choose perfect programs, perfect report making, Follow up on triage and how to be calm and consistent.With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.Checkout the curriculum and the course teaser for more info! Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 How you can connect with me? Lecture 3 Connect With me Section 2: Setting Up Of Burp-Suite Lecture 4 and Set up Lecture 5 Configuration Of Burp Suite Lecture 6 Basic Information about its working Section 3: Functioning Of A Website Lecture 7 Types of websites Lecture 8 HTTP Responses Lecture 9 Status Codes Lecture 10 Discussing the structure of HTTP response Section 4: OWASP Lecture 11 What is its meaning Lecture 12 Comparison of previous and new OWASP Lists Section 5: About CVSS and Priority Levels Lecture 13 CVSS Scores Lecture 14 Priority Levels on Bug Bounty Programs Section 6: XSS[Cross-Site Scripting] Lecture 15 Types of XSS and its meaning Lecture 16 How to hunt for reflected Reflected XSS Lecture 17 How to hunt for stored XSS Lecture 18 Brief about DOM-Based XSS Lecture 19 Where to practise XSS Skills? Lecture 20 Site To Practise Section 7: CSRF[ Cross Site Request Forgery] Lecture 21 Meaning Of CSRF? Lecture 22 How to hunt CSRF? Lecture 23 Advance CSRF techniques Section 8: SQL Injection Lecture 24 Types Of SQL Injection Lecture 25 SQL injection vulnerability in WHERE clause Lecture 26 SQL injection UNION attack Lecture 27 Practising SQL Section 9: CORS[Cross Origin Resource Sharing] Lecture 28 Meaning Lecture 29 Practice Of CORS Lecture 30 Login Bypass Section 10: XXE[XML External Entity] Lecture 31 Meaning of XXE Lecture 32 Practise Lab 2 Lecture 33 Practising XXE Lab 1 Section 11: SSRF[Server Side Request Forgery] Lecture 34 Meaning of SSRF? Lecture 35 Basic SSRF Lab Lecture 36 Advance SSRF Lab Section 12: OS Command Injection Lecture 37 Meaning Lecture 38 Practice Lab 1 Lecture 39 Practise Lab 2 Lecture 40 Practise Section 13: Directory Traversal Lecture 41 Meaning Lecture 42 Practise Lab 1 Section 14: Access Control Vulnerabilities Lecture 43 Meaning Lecture 44 Practise Lab 1 Lecture 45 Practise Lab 2 Section 15: Broken Authentication Lecture 46 Meaning Lecture 47 Practise Lab 1 Lecture 48 Practise Lab 2 Section 16: Information Disclosure Lecture 49 Meaning Lecture 50 Error Message Information Disclosure Lecture 51 Authentication Bypass by Information Disclosure Section 17: Business Logic Vulnerabilities Lecture 52 Meaning Lecture 53 Practise Lab 1 Lecture 54 Practise Lab 2 Lecture 55 Practise Section 18: OAuth Authentication Lecture 56 Meaning Lecture 57 Practise Lab 1 Lecture 58 Practise Lab 2 Section 19: File Upload Vulnerabilities Lecture 59 Meaning Lecture 60 Practise Lab 1 Lecture 61 Practise Lab 2 Section 20: More Learnings Lecture 62 How to choose targets for bug bounty? Lecture 63 Think Big - Hunt Big Lecture 64 Effective report making Lecture 65 Follow up on triage Lecture 66 Most Imp Lesson[Stay Calm and Effective] Students who want to gain knowledge,People trying to jumpstart their career,Aspiring Bug Bounty Hunter,Web Application Pentesters HomePage:
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.