This course is focused on learning by doing. We are going to teach you how penetration testing works, by actually practicing the techniques and methods used by bug bounty hunters today. We will start off by creating our virtual hacking lab to make sure we keep your computers safe throughout the course, as well as doing things legally, and having our computers set up for penetrations testing.
Syllabus
- Introduction To Bug Bounty
- Our Virtual Lab Setup
- Website Enumeration & Information Gathering
- Introduction To Burpsuite
- HTML Injection
- Command Injection/Execution
- Broken Authentication
- Bruteforce Attacks
- Sensitive Data Exposure
- Broken Access Control
- Security Misconfiguration
- Cross Site Scripting – XSS
- SQL Injection
- XML, XPath Injection, XXE
- Components With Known Vulnerabilities
- Insufficient Logging And Monitoring
- Monetizing Bug Hunting
- Extra – Web Developer Fundamentals
- Extra – Linux Terminal
- Extra – Networking