In this course we cover an introduction to bug bounty hunting and web application hacking.
links to resources used in this course
0:00 About the course
2:51 Installing Kali linux
13:31 Recon & Tools
25:03 URL Testing
47:27 Using OWASP Juice Shop
55:39 IDOR & Logic Errors
1:43:50 SQL Injection
2:58:08 Directory Traversals
3:16:21 XML Injection XXE
3:30:02 XSS
3:54:31 Python Crash Course
links to resources used in this course
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
This link is hidden for visitors. Please Log in or register now.
0:00 About the course
2:51 Installing Kali linux
13:31 Recon & Tools
25:03 URL Testing
47:27 Using OWASP Juice Shop
55:39 IDOR & Logic Errors
1:43:50 SQL Injection
2:58:08 Directory Traversals
3:16:21 XML Injection XXE
3:30:02 XSS
3:54:31 Python Crash Course