Bug Bounty - An Advanced Guide to Finding Good Bugs
Navigation X

[Big Banner Ad Space Available]
[Big Banner Ad Space Available]

Bug Bounty - An Advanced Guide to Finding Good Bugs

posted by Sauron and Last Post: 10 months ago


Bug Bounty - An Advanced Guide to Finding Good Bugs  1155
Sauron Moderator
3.684
Posts
3.561
Threads
Moderator
#1
[Image: wBmGOFmC0DwDnTnnbmrssmUkOCbzIK1l-min.jpg]
 Requirements
  • Medium-Good knowndlege of web application security
DescriptionUPDATE: as of this course becoming the #bestseller on Udemy, we have opened a private discord channel for all students where we do 1 live hacking session per week. Please join the discord after enrolling to attend the live hacking sessions! Thank you for the trust!
Bug bounties are evolving year after year and thousands of infosec enthuasiasts are looking to join the boat. Having a great place on that boat requires dedication and investing a great amount of time of work. In fact, there are multiple types of vulnerabilities and mastering the most important of these can be a game changer. In this class, attendees will learn the "how" and "why" of vulnerabilities they are already aware of instead of sticking to what the vulnerability is in general. This class will be based on real-life scenarios to show how to think out of the box in different scenarios to bring in the maximum impact.
 
During the session, students will have hands on excercises with:
  1. SQL Injection
  2. XXE
  3. SSRF
  4. RECON out of the box
  5. RCE
  6. SSTI
  7. Directory Traversal
  8. Access Control Vulns
  9. Authentication Issues
  10. Cache Poisoning
  11. Info Disclosure
  12. More subjects to be treated
Who Should Attend This Course
This course is intended for students with an interest in bug bounties, web vulnerability discovering and exploitation, or general infosec enthusiast who whish to know more about the side of bug bounties. Students should be comfortable with the type of vulnerabilities mentionned because we are not going to cover from a totaly beginner's side.
 
Key Takeaways
  1. Students will learn in-depth about a vulnerability exploitation
  2. Students will be able to approach a target effectively
  3. Students will learn thinking out of the box in different scenarios
     
Who this course is for:
  • Bug bounty hunters and anyone interested into web application security
  • Pentesters
  • Hackers
Hidden Content
You must register or login to view this content.

Password:leakforum.io

 Password:  LeakForum.io
Contact other staff members for help im no longer as active!
 
del1ja500 Member
85
Posts
0
Threads
Member
#2
thanks mate
Devilevil Junior Member
2
Posts
0
Threads
Junior Member
#3
thanks
newrealler Junior Member
2
Posts
0
Threads
Junior Member
#4
thank uuu


Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)