Autoplay
Autocomplete
Previous Lesson
Complete and Continue
AI for Cybersecurity & Bug Bounty Hunting
Course Overview
Course Description
Video Overview (5:02)
Introduction
Introduction (5:02)
Introduction & Fundamentals
Values (3:30)
Goals and Strategy (2:46)
Bug Bounty Techniques
Program Hunting Technique (4:33)
Program Hunting Technique -2 (2:38)
Unique ways to find Bug Bounty Program through json (4:03)
Reconnaissance
Recon - Subdomain Enumeration (4:58)
Active Subdomain Enumeration (11:20)
LLM Tools Overview
Intro to claude.ai and Ollama (13:19)
Setting up Ollama (10:02)
Setting up the Claude LLM (14:11)
Features of Claude (2:22)
Prompt Engineering
Prompts for Ollama (9:37)
Prompts for API testing (13:37)
Prompts for API testing - 2(1) (12:01)
Web AI Development
How can we expose a local web AI app through Ngrok (5:38)
What is MCP_ (6:31)
Connecting an MCP Server to the Open WebUI Model for Subdomain Enumeration and Techdetection (9:27)
Tool-Based Recon
Commands for Subfinder and Tech detection (17:47)
JavaScript Analysis
Javascript Analysis - 1 (15:54)
Javascript Analysis - 2 (4:08)
Web Exploitation
Live Exploitation - 1 (16:44)
Live Exploitation - 2 (8:32)
Introduction to Rag Modeleling works (6:33)
Training the model by external resourses (5:25)
Account takeover of Apple through 204 No Content (3:23)
Training the Ollama model (5:34)
Training Ollama model for API testing (5:13)
Prompts for APi Testing (9:10)
WAF & Core Concepts
What is WAF_ (5:20)
Introduction to Coreurlset (4:04)
Live Exploitation (13:41)
Setting up WAF bypass model in llama (7:09)
Live Exploitation (22:30)
Live exploitation - 2 (9:12)
Introduction of Shell Globbing
Understanding Shell globbing (7:58)
Live Demonstration (8:05)
Live exploitation - 2 (15:20)
Live Exploitation (1:46)
Techniques of Shell Globbing
Technique’s for shell gloabbing (14:40)
Technique’s for shell gloabbing - 2 (11:09)
LLMs & Automation
POC (2:13)
Using LLMs to Automate Command Generation with Ollama (6:43)
finding recent acquisitions using our model (7:07)
Automating Tasks with System Memory in Ollama (13:25)
HTTPX & Screenshots
Using HTTPX Screenshot to perform vuln (17:26)
VAPT Report Generation
Creating VAPT reports through Ollama (12:04)
Creating VAPT reports through Ollama - 2 (8:35)
Nuclei & YAML Automation
Exploiting Nuclei Template (11:56)
Method 1 - Creating a YAML Template (6:03)
Method 2 - Creating a YAML Template using llama (8:43)
Generating curl request into nuclei template (6:34)
Postman Usage
Setting up the Postman (7:47)
Setting up the backend of Postman (3:22)
API Vulnerability Testing
Identify vulnerable API endpoints and request bodies using llama (13:45)
Audio Version of Training
Audio Download
Identify vulnerable API endpoints and request bodies using llama
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock