
About Course
Building on the foundation of Bug Bounty V1, this course dives deeper into advanced vulnerability exploitation. It focuses on specific threats such as SQL Injection, HTML Injection, Clickjacking, and Server-Side Request Forgery (SSRF). Participants will engage in hands-on simulations and become proficient with specialized tools for these vulnerabilitiesCourse curriculum
- Introduction
- Introduction
- Disclaimer
- Course Future Updates
- Future Updates - Setting up Environment
- Burp Suite Proxy Lab Setup - Bugcrowd VRT
- Bugcrowd VRT 1
- BugCrowd VRT 2 - Subdomain Takeovers
- What are Subdomains
- What is DNS
- Subdomain Enum
- Fastest Resolver
- What are DNS Records
- Sublister
- Findomain
- Subfinder
- Recursive Subdomain Enumeration
- Can I take over XYZ
- Can I take over ALL XYZ
- AWS Live -1
- AWS Live -2
- AWS Bugcrowd Report Breakdown
- Tumblr
- Shopify - Local File Inclusion
- What is LFI
- LFI Exploitation on Lab
- LFI Exploitation on Live -1
- LFI Exploitation Live -2
- LFI Exploitation LFi to RCE
- LFI vs RFI - SQL Injection
- SQL Injection Background Concept
- SQL vs Spreadsheets
- SQL Database Importance
- SQL Practical Hands on - First Table
- SQL Practical Hands on - Queries
- SQL Practical Hands on - Second Table
- SQL Practical Hands on - Exercise
- Truth Table
- Truth Table Practical
- SQL Understanding the Logic
- SQL Query Breakdown
- SQL Injection Impact & Approach
- SQLi on Lab-1
- SQL Query Breakdown payload-2
- SQLi on Lab-2
- Burp suite Web Academy
- SQLi Labs Data Retrieval Lab
- SQLi Labs Data Retrieval Live
- SQLi Login Bypass Lab
- SQLi Login Bypass Live 1
- SQLMap Installation & Setup
- SQLMap Exploitation - Live 2
- SQLMap Exploitation - Live 3
- Shell Exploitation Techniques
- SQL: Shell Exploitation - Live 4 - HTML Injection
- What is HTML
- Understanding HTML
- HTML
- HTML Injection - Lab
- HTML Injection Live-1 - Click Jacking
- Click Jacking Live-1
- Click Jacking Live-2
- Click Jacking Live-3
- Click Jacking Live-4
- Clickjacking Exploitation
- Clickjacking Live Target Exploitation
- Clickjacking Automation Live Target Exploitation
- Clickjacking - ClickBandit with Burpsuite - Broken Link Hijacking
- Introduction & Background Concept
- BLH Exploitation Practical
- BLH Exploitation Tool
- BLH Instagram Report Breakdown
- BLH Exploitation Practical Live
- BLH Hackerone Report Breakdown
- BLH Practical Tool Resource
- BLH Exploitation Practical Extension Tool - SSRF
- SSRF Introduction & Principle
- SSRF Practical
- SSRF Bincatcher Listener
- SSRF against Server Itself
- SSRF against another Backend Server
- SSRF Bypass Protection Blacklist Filter
- SSRF Bypass Protection Whitelist Filter
- SSRF Chaining with Open Redirect and Bypass Filter
- SSRF Exploitation using MPEG - Live
- SSRF Exploitation JIRA chaining with XSS - Live
- SSRF Exploitation JIRA chaining with XSS - Live
- SSRF Exploitation JIRA Automation with Python
- SSRF Facebook Breakdown
- SSRF Microstrategy Live -1
- SSRF PHP Filter Live
- SSRF PHP Filter Wordpress Config Live - How to start with Bug Bounty Platforms and Reporting
- BugCrowd ROADMAP
- Hackerone ROADMAP
- Open Bug Bounty ROADMAP
- NCIIPC Govt of India ROADMAP
- RVDP All Websites ROADMAP
- Synack ROADMAP
- Intigriti ROADMAP - Bug Bounty / Penetration Testing Reporting Templates
- Reporting Templates - We have your back! - Remote Code Execution
- Apache Unomi RCE Live - Snapshot of Ethical hacking bug bounty V2
- New Features of Burpsuite Community 2023.7
- Snapshot of SQL injection
- Snapshot of Broken Link Hijacking
- Basics and Common Mistakes to Avoid while doing Subdomain Enumeration
Download
Free download for users PRIV8
Password
htdark.com