• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Resource icon

Bug Bounty Hunting and Penetration Testing v2 2025-01-12

No permission to download

Screenshot-2025-01-12-12-09-15-43-e4424258c8b8649f6e67d283a50a2cbc.jpg


About Course​

Building on the foundation of Bug Bounty V1, this course dives deeper into advanced vulnerability exploitation. It focuses on specific threats such as SQL Injection, HTML Injection, Clickjacking, and Server-Side Request Forgery (SSRF). Participants will engage in hands-on simulations and become proficient with specialized tools for these vulnerabilities


Course curriculum

  1. Introduction
    - Introduction
    - Disclaimer
    - Course Future Updates
    - Future Updates
  2. Setting up Environment
    - Burp Suite Proxy Lab Setup
  3. Bugcrowd VRT
    - Bugcrowd VRT 1
    - BugCrowd VRT 2
  4. Subdomain Takeovers
    - What are Subdomains
    - What is DNS
    - Subdomain Enum
    - Fastest Resolver
    - What are DNS Records
    - Sublister
    - Findomain
    - Subfinder
    - Recursive Subdomain Enumeration
    - Can I take over XYZ
    - Can I take over ALL XYZ
    - AWS Live -1
    - AWS Live -2
    - AWS Bugcrowd Report Breakdown
    - Tumblr
    - Shopify
  5. Local File Inclusion
    - What is LFI
    - LFI Exploitation on Lab
    - LFI Exploitation on Live -1
    - LFI Exploitation Live -2
    - LFI Exploitation LFi to RCE
    - LFI vs RFI
  6. SQL Injection
    - SQL Injection Background Concept
    - SQL vs Spreadsheets
    - SQL Database Importance
    - SQL Practical Hands on - First Table
    - SQL Practical Hands on - Queries
    - SQL Practical Hands on - Second Table
    - SQL Practical Hands on - Exercise
    - Truth Table
    - Truth Table Practical
    - SQL Understanding the Logic
    - SQL Query Breakdown
    - SQL Injection Impact & Approach
    - SQLi on Lab-1
    - SQL Query Breakdown payload-2
    - SQLi on Lab-2
    - Burp suite Web Academy
    - SQLi Labs Data Retrieval Lab
    - SQLi Labs Data Retrieval Live
    - SQLi Login Bypass Lab
    - SQLi Login Bypass Live 1
    - SQLMap Installation & Setup
    - SQLMap Exploitation - Live 2
    - SQLMap Exploitation - Live 3
    - Shell Exploitation Techniques
    - SQL: Shell Exploitation - Live 4
  7. HTML Injection
    - What is HTML
    - Understanding HTML
    - HTML
    - HTML Injection - Lab
    - HTML Injection Live-1
  8. Click Jacking
    - Click Jacking Live-1
    - Click Jacking Live-2
    - Click Jacking Live-3
    - Click Jacking Live-4
    - Clickjacking Exploitation
    - Clickjacking Live Target Exploitation
    - Clickjacking Automation Live Target Exploitation
    - Clickjacking - ClickBandit with Burpsuite
  9. Broken Link Hijacking
    - Introduction & Background Concept
    - BLH Exploitation Practical
    - BLH Exploitation Tool
    - BLH Instagram Report Breakdown
    - BLH Exploitation Practical Live
    - BLH Hackerone Report Breakdown
    - BLH Practical Tool Resource
    - BLH Exploitation Practical Extension Tool
  10. SSRF
    - SSRF Introduction & Principle
    - SSRF Practical
    - SSRF Bincatcher Listener
    - SSRF against Server Itself
    - SSRF against another Backend Server
    - SSRF Bypass Protection Blacklist Filter
    - SSRF Bypass Protection Whitelist Filter
    - SSRF Chaining with Open Redirect and Bypass Filter
    - SSRF Exploitation using MPEG - Live
    - SSRF Exploitation JIRA chaining with XSS - Live
    - SSRF Exploitation JIRA chaining with XSS - Live
    - SSRF Exploitation JIRA Automation with Python
    - SSRF Facebook Breakdown
    - SSRF Microstrategy Live -1
    - SSRF PHP Filter Live
    - SSRF PHP Filter Wordpress Config Live
  11. How to start with Bug Bounty Platforms and Reporting
    - BugCrowd ROADMAP
    - Hackerone ROADMAP
    - Open Bug Bounty ROADMAP
    - NCIIPC Govt of India ROADMAP
    - RVDP All Websites ROADMAP
    - Synack ROADMAP
    - Intigriti ROADMAP
  12. Bug Bounty / Penetration Testing Reporting Templates
    - Reporting Templates - We have your back!
  13. Remote Code Execution
    - Apache Unomi RCE Live
  14. Snapshot of Ethical hacking bug bounty V2
    - New Features of Burpsuite Community 2023.7
    - Snapshot of SQL injection
    - Snapshot of Broken Link Hijacking
    - Basics and Common Mistakes to Avoid while doing Subdomain Enumeration

Download
Free download for users PRIV8

Password
htdark.com
Back
Top