Overview
- This course “Practical Bug Bounty Hunting for Hackers and Pentesters, will guide you from finding targets, over developing exploits to writing comprehensive reports and ensure your success in the Bug Bounty industry.
- By the end of this course, with hands-on examples and real-world tricks, you will soon be able to find your first bug.
Course Module
Duration: 40 Hours
- About Cyber Security Industry
- What is Bug Bounty
- What is Penetration Testing
- What is Red Teaming
- What is SOC
- Needs to be a Professional Bug Hunter
- Setting up Hacking Machine
- Introduction to Linux Environment
- Introduction to Networking
- Web Application Fundamentals & Configurations
- HTTP and HTTPS Protocol
- HTTP Requests & HTTP Response
- URL & URI
- HTTP Methods
- HTTP Response Status Codes
- SOP & CORS
- Introduction to Web Application Security Testing
- Types of Web Application Security Testing
- Approach for Web App Penetration Testing
- Web Application Reconnaissance
- Working with Burp suite
- Exploiting Traditional Web Application Vulnerabilities
- Sub Domain Take Over o Click Jacking
- Checking Necessary Security Headers
- Checking SPF & DMARC Record
- CORS (Cross-Origin Resource Sharing)
- Testing Rate Limit
- Introduction to Session Managements
- What is Session Management
- Testing Weak Session Logout Policy
- Testing For Session Timeout
- Session Fixation Vulnerability
- Introduction to XSS (Cross-Site Scripting)
- Exploiting Reflected XSS
- Exploiting Stored XSS
- Exploiting DOM XSS
- Introduction to SQL injection
- Logic behind SQL injection
- Authentication Bypass using SQL injection
- Error Balancing in SQLi
- Information Disclosure (Exploiting Database) through SQL injection
- Automate SQL injection Process
- Introduction to File Inclusion Vulnerability
- Exploiting LFI
- Exploiting RFI
- CSRF (Cross-Site Request Forgery Attack)
- SSRF (Server-Side Request Forgery Attack)
- Exploiting Blind SSRF
- IDOR (Insecure Direct Object Reference)
- OS Command injection
- Response Manipulation
- Host Header Injection
- Parameter Tampering
- XXE (XML External Entity)
- RCE (Remote Code Execution)
- Introduction to Bug Bounty Platforms
- Hackerone
- Bug Crowd
- Open Bug Bounty Programs