دوره Jason Haddix – The Bug Hunter’s Methodology

The Bug Hunter’s Methodology (TBHM) is a two-day, paid, virtual training that aims to equip you with the latest tools, techniques, and strategies, plus provide a data-driven methodology on how and where to search for vulnerabilities that are currently common in the wild.

Unlike other courses, TBHM Live is not an A-Z or beginner-oriented course. True to the spirit of my public TBHM talks, my emphasis is on expert tips, time-saving tricks, practical Q&As, automation strategies, vetted resources, and engagement via the dedicated community on Discord.

Syllabus

  • Day 1

    • Recon Part 1: Recon Concepts

    • Recon Part 2: Acquisitions and Domains

    • Recon Part 3: Subdomain Enumeration

    • Recon Part 4: Server & App Level Analysis

    • Recon Part 5: Profiling People for Social Engineering

    • Recon Part 6: Recon Adjacent Vulnerability Analysis

    • Recon Part 7: Recon Frameworks and Helpers

  • Day 2

    • Application Analysis Part 1: Analysis Concepts

    • Application Analysis Part 2: Vulnerability Automation

    • Application Analysis Part 3: Content Discovery

    • Application Analysis Part 4: The Big Questions

    • Application Analysis Part 5: Application Heat Mapping

    • Application Analysis Part 6: Web Fuzzing & Analyzing Fuzzing Results

    • Application Analysis Part 7: Introduction to Vulnerability Types

    • Application Analysis Part 8: XSS Tips and Tricks

    • Application Analysis Part 9: IDOR Tips and Tricks

    • Application Analysis Part 10: SSRF Tips and Tricks

    • Application Analysis Part 11: XXE

    • Application Analysis Part 12: File Upload Vulnerabilities Tips and Tricks

    • Application Analysis Part 13: SQL Injection Tips and Tricks

    • Application Analysis Part 14: Command Injection Tips and Tricks

    • Application Analysis Part 15: COTS and Framework Scanning

    • Application Analysis Part 16: Bypass of security controls

Jason Haddix – The Bug Hunter’s Methodology