Bug Bounty Hunting
Offered By: HackerSploit via YouTube
Course Description
Overview
Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. These hackers are then duly rewarded for discovering these vulnerabilities before they become a detrimental security issue.
Get an hand-on approach on hunting bugs. Hackerspoilt does a walkthrough with the tools that he uses when hunting vulnerabilities on Kali Linux.
Syllabus
Bug Bounty Hunting - Tools I Use.
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation.
Bug Bounty Hunting - iframe Injection & HTML Injection.
Heartbleed Exploit - Discovery & Exploitation.
Bug Bounty Hunting - PHP Code Injection.
bWAPP - HTML Injection - Reflected POST.
bWAPP - HTML Injection - Stored (Blog).
bWAPP - OS Command Injection With Commix (All levels).
bWAPP - Server-Side Include (SSI) Injection.
Docker For Pentesting And Bug Bounty Hunting.
Docker For Pentesting On Windows [Cybersecurity].
BugBountyToolkit - Running Multiple Sessions With Tmux.
Passive Recon With OSRFramework.
Passive Recon - Subdomain Enumeration With Sublist3r.
DNS Enumeration And Zone Transfers.
DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap.
Dumping S3 Buckets | Exploiting S3 Bucket Misconfigurations.
Taught by
HackerSploit
Related Courses
Advanced Cryptography - Tunnelling SSL/TLS/VPNBill Buchanan OBE via YouTube Perfect Forward Secrecy in TLS Explained
Hussein Nasser via YouTube More Libraries! More Vulnerabilities! More Things! Now with Real World Case Studies
Kaspersky via YouTube Heap Models for Exploit Systems
IEEE via YouTube OpenSSL After Heartbleed - Lessons Learned and Project Improvements
Linux Foundation via YouTube