Bug Bounty Hunting
Offered By: HackerSploit via YouTube
Course Description
Overview
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. These hackers are then duly rewarded for discovering these vulnerabilities before they become a detrimental security issue.
Get an hand-on approach on hunting bugs. Hackerspoilt does a walkthrough with the tools that he uses when hunting vulnerabilities on Kali Linux.
Syllabus
Bug Bounty Hunting - Tools I Use.
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation.
Bug Bounty Hunting - iframe Injection & HTML Injection.
Heartbleed Exploit - Discovery & Exploitation.
Bug Bounty Hunting - PHP Code Injection.
bWAPP - HTML Injection - Reflected POST.
bWAPP - HTML Injection - Stored (Blog).
bWAPP - OS Command Injection With Commix (All levels).
bWAPP - Server-Side Include (SSI) Injection.
Docker For Pentesting And Bug Bounty Hunting.
Docker For Pentesting On Windows [Cybersecurity].
BugBountyToolkit - Running Multiple Sessions With Tmux.
Passive Recon With OSRFramework.
Passive Recon - Subdomain Enumeration With Sublist3r.
DNS Enumeration And Zone Transfers.
DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap.
Dumping S3 Buckets | Exploiting S3 Bucket Misconfigurations.
Taught by
HackerSploit