Building on the foundation of Bug Bounty V1, this course dives deeper into advanced vulnerability exploitation. It focuses on specific threats such as SQL Injection, HTML Injection, Clickjacking, and Server-Side Request Forgery (SSRF). Participants will engage in hands-on simulations and become proficient with specialized tools for these vulnerabilities.
Syllabus
- Introduction
- OWASP Top 10
- Burp Suite and Lab Setup
- Authentication Bypass
- No Rate-Limit Attacks
- Cross Site Scripting (XSS)
- Cross Site Request Forgery (CSRF)
- Cross Origin Resource Sharing (CORS)
- How to Start with Bug Bounty Platforms and Reporting
- Bug Bounty Reporting Templates
- Exploitation of CVE 2020-5902 Remote Code Execution
- Exploitation of CVE 2020-3452 File Read
- Exploitation of CVE 2020-3187 File Delete
- Snapshot
- OWASP 2021