Lecture 80 - Introduction

Live bug hunting slides.pdf

So, far throughout the course, we covered a large number of bugs and vulnerabilities.

We focused on one bug or vulnerability at a time and we dive deep into it, covering different scenarios, different ways to discover it and bypass security and bypass filtering and sometimes even different ways to display impact and to exploit it.

But you know, in a real life scenario, this is not always the case.

You don't always know what the target is going to be vulnerable to.

You, usually have a website and you have to discover bugs or pentest it.

Therefore I decided to create the next section and it's actually not a small section, it's pretty big, it's almost two hours.

And in that section I'm gonna walk you through an actual real life bug hunt.

So I'm gonna show you how to combine everything that you learned so far throughout the whole course in order to discover bugs and vulnerable in a real life platform in a real life website.

I'm going to show you how I approach a target, how I get a feel on how it works and discover information about it and analyze it.

And then I'm going to show you how to test it and discover bugs and vulnerabilities within it.

And we're going to discover bugs in places that most people will think are secure and just ignored.

And also as I do this, I'm actually going to teach you more techniques and more methods to discover bugs and to think like a hacker or a bug hunter.

And we're even going to cover a new box that we haven't covered in the course, such as open redirect vulnerabilities.

So grab a coffee, stay focused and be awake, because this section is going to be full of useful, practical information.

Complete and Continue  

Become a Member and Get Unlimited Access to 310+ Top Cyber Security Courses.