BUG BOUNTY WEB HACKING
A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability.
Topics Cover In This Course
- 1.Introduction
- 2.Github
- 3.Vage
- 4.Setting up Atmosphere
- 5.Nikto
- 6.Sub Domain
- 7.Recon ng
- 8.Knockpy
- 9.Nmap
- 10.Burp Suite Cont
- 11.Spider
- 12.Scanner
- 13.Intruder
- 14.Authorization
- 15.BWap
- 16.Wapplayzer
- 17.Firebug
- 18.Hack bar
- 19.User Agent Switcher
- 20.Sublister
- 21.WP Scan
- 22.WP Scan Codex
- 23. WP Scan Template Monster
- 24. WP Scan theme
- 25. WP Scan User
- 26. CMS Map
- 27. XSS Demo
- 28. XSS Lenovo Yahoo
- 29. XSS Uber
- 30. XSS Paypal
- 31. XSS WhatsApp, Facebook
- 32. Counter Measures for XSS
- 33. SQL Drupal
- 34. Facebook SQL Injection
- 35. Counter Measures for SQL
- 36. Template Injection
- 37. Template injection Similar Report
- 38. Clickjacking
- 39. Clickjacking Report
- 40. Clickjacking Injection Similar Report
- 41. IFrame Demo
- 42. Open Redirect Report
- 43. Open Redirect Similar Report
- 44. CSRF (change password) Demo
- 45. CSRF Injection
- 46. CSRF Townwars
- 47. CRF Badoo
- 48. CRLF Injection Similar Report
- 49. Shellshock
- 50. SSRF
- 51. SSRF Similar Report
- 52. Full Path Disclosure
- 53. Full Path Disclosure Report
- 54. Full Path Disclosure Similar Report
- 55. Insecure Cryptographic Storage
- 56. Insecure Direct object References
- 57. Autorize
- 58. Broken Auth - Insecure Login Forms Demo
- 59. Privilege
- 60. Privilege Bookfresh
- 61. Testing for Privilege Manipulation
- 62. Session Mgmt - Administrative Portals
- 63. Session Report
- 64. Application logic report
- 65. Application logic similar report
- 66. HTML Injection report
- 67. HTML Injection similar Report
- 68. HTML Injection Demo
- 69. XML External entity
- 70. XXE similar Reports
- 71. Sub Domain Take over
- 72. Sub Domain Take over Report
- 73. Remote file Insulation
- 74. Remote Code Execution
- 75. Remote Code Execution Similar Reports
- 76. Cookies
- 77. crt.sh
- 78. Sensitive Data Exposure
- 79. Buffer overflow
- 80. Buffer overflow Similar Report
- 81. IDOR
- 83. DNS misconfiguration
- 84. DNS misconfiguration Similar Reports
- 85. Denail of service (DoS)
- 86. DOS report
- 87. DOS Similar report
- 88. Finding Report using Google
- 89. Searching similar Reports
- 90. HTTP Parameter Pollution
- 91. OSINT
- 92. Methodology
- 93. 02 Analyze the Application
- 94. 03 Test client-side Controls
- 95. 04 Authentication Mechanism
- 96. 05 Test Session
- 97. 06 Test Access Control
- 98. 07 Test for Input-based vulnerabilities
- 99. 08 Test for fuction
- 100. 09-Test for Logic Flaws
- 101. 10-Test for Shared Hosting Vulnerabilities
- 102. 11-Test for Application Server Vulnerabilities
- 103. 12-Miscellaneous Checks
- 104. 13-Follow Up Any Information Leakage
- 105. Reporting Vulnerability 1
- 106. Reporting Vulnerability 2
0 Comments