Bug Bounty V1 course offers a comprehensive introduction to identifying and responsibly exploiting application vulnerabilities. It covers Web Application Architecture fundamentals and the critical OWASP Top 10. Participants will learn to distinguish Bug Bounty Hunting from Penetration Testing, engage in hands-on simulations, and master essential tools like Burp Suite.
Syllabus
- Introduction
- OWASP Top 10
- Burp Suite and Lab Setup
- Authentication Bypass
- No Rate-Limit Attacks
- Cross Site Scripting (XSS)
- Cross Site Request Forgery (CSRF)
- Cross Origin Resource Sharing (CORS)
- How to Start with Bug Bounty Platforms and Reporting
- Bug Bounty Reporting Templates
- Exploitation of CVE 2020-5902 Remote Code Execution
- Exploitation of CVE 2020-3452 File Read
- Exploitation of CVE 2020-3187 File Delete
- Snapshot
- OWASP 2021