Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Bug Bounty Hunting & Web Security Testing From Scratch
Training Overview
Description of Training
Video Overview (3:08)
Section 1 - Introduction
Course Introduction (3:08)
Introduction to Bug Hunting (6:43)
What is a Website? (5:16)
Section 2 - Information Disclosure vulnerabilities
Introduction to Information Disclosure Vulnerabilities (1:49)
Discovering Database Login Credentials (9:25)
Discovering Endpoints & Sensitive Data (8:01)
Introduction to HTTP Status Codes (7:45)
Employing the Hacker / Bug Hunter Mentality to Discover Admin Login Information (8:16)
Manipulating Application Behaviour Through the HTTP GET Method (5:46)
Manipulating Application Behaviour Through the HTTP POST Method (6:49)
Intercepting Requests With Brup Proxy (10:21)
Section 3 - Broken Access Control Vulnerabilities
Introduction to Broken Access Control Vulnerabilities (1:11)
Cookie Manipulation (8:14)
Accessing Private User Data (7:20)
Discovering IDOR Vulnerabilities (Insecure Direct Object Reference) (9:00)
Privilege Escalation with Burp Repeater (9:30)
Debugging Flows with HTTP TRACE & Gaining Admin Access! (8:05)
Section 4 - Path/Directory Traversal
Introduction to Path Traversal Vulnerabilities & Basic Discovery (9:30)
Bypassing Absolute Path Restriction (4:41)
Bypassing Hard-coded Extensions (4:22)
Bypassing Filtering (4:07)
Bypassing Hard-coded Paths (4:31)
Bypassing Advanced Filtering (6:10)
Bypassing Extreme Filtering (8:37)
Section 5 - CSRF - Client-Side Request Forgery
Discovering & Exploiting CSRF Vulnerabilities (9:19)
Section 6 - OAUTH 2.0 Vulnerabilities
Introduction to OAUTH 2.0 (4:21)
OAUTH 2.0 Basic Exploitation (9:48)
Exploiting a Linking OAUTH 2.0 Flow Through CSRF (12:23)
Exploiting a Login OAUTH 2.0 Flow Through CSRF (13:19)
Section 7 - Injection Vulnerabilities
Introduction to Injection Vulnerabilities (1:21)
Section 8 - OS Command Injection
Discovering a Basic Command Injection Vulnerability (7:40)
Discovering Blind Command Injection Vulnerabilities (9:00)
Discovering Asynchronous Blind Command Injection Vulnerabilities (8:08)
Using Burp Collaborator to Exploit Asynchronous Blind Command Injection (5:28)
Section 9 - XSS - Cross Site Scripting
Introduction to XSS Vulnerabilities & Its Types (4:01)
Discovering a HTML Injection Vulnerability (5:23)
Discovering Reflected & Stored XSS Vulnerabilities (5:29)
Section 10 - DOM XSS Vulnerabilities
Introduction to DOM XSS Vulnerabilities (5:23)
Discovering a Reflected DOM XSS in a Link (5:40)
Discovering a Reflected XSS in an Image Tag! (5:42)
Injecting Javascript Directly in a Page Script (6:25)
Discovering XSS in a Drop-down Menu (4:25)
Discovering XSS in AngularJS Application (4:18)
Section 11 - XSS - Bypassing Security
Bypassing Single-Quotes Filtering (7:33)
Bypassing Advanced Filtering (10:22)
Bypassing Server-Side Filtering (6:43)
Bypassing Extreme Filtering with Burp Intruder (9:21)
Section 12 - Bypassing Content Security Policy (CSP)
Analysing the Target Application (5:46)
Lecture 44 - Bypassing Basic Filtering (5:59)
Discovering an XSS in a CSP Enabled Application (8:15)
Section 13 - SQL Injection Vulnerabilities
Introduction to SQL Injection Vulnerabilities (7:20)
Discovering SQL Injections (7:22)
Bypassing Admin Login Using Logical Operators (4:43)
Selecting Data From the Database (7:56)
Accessing The Database Admin Records (6:44)
Section 14 - Blind SQL Injections
Discovering Blind SQL Injections (5:56)
Enumerating Table & Column Names (10:07)
Recovering Administrator Password With Burp Intruder (7:56)
Using the Cluster-Bomb Attack to Recover Passwords (7:30)
Section 15 - Time-Based Blind SQL Injection
Discovering Time-Based Blind SQLi (8:07)
Extracting Data From the Database Using a Time-Based Blind SQLi (10:30)
Getting The Admin Password Using a Time-Based Blind SQLi (9:34)
Section 16 - SSRF (Server-Side Request Forgery)
Introduction to SSRF Vulnerabilities (0:48)
Theory Behind SSRF Vulnerabilities & Their Impact (6:52)
Discovering a Basic SSRF Vulnerability (5:01)
Accessing Private (Admin) Resources Using an SSRF Vulnerability (6:26)
Section 17 - SSRF - Advanced Exploitation
Advanced SSRF Discovery (5:54)
Scanning & Mapping Internal Network & Services (7:43)
Section 18 - SSRF - Bypassing Security
Bypassing Blacklists (8:10)
Bypassing Whitelists (9:40)
Chaining Open Redirection with SSRF to Bypass Restrictive Filters (6:44)
Section 19 - Blind SSRF Vulnerabilities
Introduction to Blind SSRF Vulnerabilities (3:58)
Discovering Blind SSRF Vulnerabilities (6:19)
Exploiting Blind SSRF Vulnerabilities (7:48)
Escalating Blind SSRF to a Remote Code Execution (RCE) (7:55)
Section 20 - XXE (XML External Entity) Injection
Introduction to XXE Injection Vulnerabilities (0:48)
What is XML? (3:21)
Exploiting a Basic XXE Injection (8:43)
Discovering an SSRF Through a Blind XXE (6:37)
Section 21 - 2 Hour Live Bug Hunting !
Introduction (1:40)
Overview of the Target (8:57)
Discovering an Open Redirect Vulnerability (6:42)
Discovering a an XSS in the Response (9:09)
Discovering an XSS in a HTML Comment (8:54)
Discovering an XSS in a Date Picker (5:53)
Broken Access Control in Booking Page (5:52)
Analysing Application Files & Finding Sensitive Data (11:57)
Discovering Endpoints Hidden In Code (3:54)
Discovering an IDOR - Insecure Direct Object Reference (3:38)
Discovering Hidden Endpoints Using Regex (9:10)
Discovering a Complex Stored XSS (10:42)
Discovering Bugs in Hidden Elements (8:01)
Discovering Bugs in Hidden Parameters (6:42)
Section 22 - Participating in Bug Bounty Programs
Hacker1 Overview (10:25)
Bug-Bounty Overview (6:36)
Submitting a Bug Report (8:10)
Audio Version of Training
Audio Download
Discovering Asynchronous Blind Command Injection Vulnerabilities
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock