YoVDO

Bug Bounty Hunting

Offered By: HackerSploit via YouTube

Tags

Bug Bounty Courses Heartbleed Courses

Course Description

Overview

Bug-Bounty is a process where hacking companies, or hackers, act as 'middle-men' to detect bugs in software and address cyber vulnerabilities that organisations are facing. These hackers are then duly rewarded for discovering these vulnerabilities before they become a detrimental security issue.

Get an hand-on approach on hunting bugs. Hackerspoilt does a walkthrough with the tools that he uses when hunting vulnerabilities on Kali Linux.


Syllabus

Bug Bounty Hunting - Tools I Use.
Bug Bounty Hunting - Wfuzz - Web Content Discovery & Form Manipulation.
Bug Bounty Hunting - iframe Injection & HTML Injection.
Heartbleed Exploit - Discovery & Exploitation.
Bug Bounty Hunting - PHP Code Injection.
bWAPP - HTML Injection - Reflected POST.
bWAPP - HTML Injection - Stored (Blog).
bWAPP - OS Command Injection With Commix (All levels).
bWAPP - Server-Side Include (SSI) Injection.
Docker For Pentesting And Bug Bounty Hunting.
Docker For Pentesting On Windows [Cybersecurity].
BugBountyToolkit - Running Multiple Sessions With Tmux.
Passive Recon With OSRFramework.
Passive Recon - Subdomain Enumeration With Sublist3r.
DNS Enumeration And Zone Transfers.
DNS Bruteforcing And Subdomain Enumeration With Fierce & Nmap.
Dumping S3 Buckets | Exploiting S3 Bucket Misconfigurations.


Taught by

HackerSploit

Related Courses

Advanced Cryptography - Tunnelling SSL/TLS/VPN
Bill Buchanan OBE via YouTube
Perfect Forward Secrecy in TLS Explained
Hussein Nasser via YouTube
More Libraries! More Vulnerabilities! More Things! Now with Real World Case Studies
Kaspersky via YouTube
Heap Models for Exploit Systems
IEEE via YouTube
OpenSSL After Heartbleed - Lessons Learned and Project Improvements
Linux Foundation via YouTube