Ethical HackingPenetration Testing Bug Bounty Hunting v2

Complete Practical Course on Ethical Hacking, Penetration Testing and Bug Bounty Hunting with Live Attacks
Ethical HackingPenetration Testing Bug Bounty Hunting v2
File Size :
4.29 GB
Total length :
10h 1m

Category

Instructor

Shifa Cyclewala

Language

Last update

4/2022

Ratings

4.4/5

Ethical HackingPenetration Testing Bug Bounty Hunting v2

What you’ll learn

Bug Bounty Hunting – Live
Tips and Tricks to hunt bugs
BreakDown of Hackerone Reports for better understanding
Interview Preparation Questions Answers and Approach
Web Application Penetration Testing – Live
Become a bug bounty hunters & Hunt on Live Websites
Intercept requests using a Burpsuite proxy
Gain full control over target server using SQL Injection Attacks
Discover Vulnerabilities, technologies & services used on target website.
Subdomain Takeovers
SQLi Interview Questions and Answers
Hunt Basic HTML Injection Vulnerabilities on Live Environments
Hunt Basic ClickJacking Vulnerabilities on Live Environments
Exploit and perform Local File Inclusion (LFI) on Live websites
Exploit and perform RemoteFile Inclusion (RFI) on Live websites
Exploit and perform Remote Code Execution (RCE) on Live websites
Fix and Mitigations against SQLi Vulnerabilities
Practical Tips and Tricks for hunting SQLi Live
Broken Link Hijacking
Fix and Mitigations against RCE Vulnerabilities
Interview Questions and answers
Bug Bounty – Roadmap for Hackerone
Bug Bounty – Roadmap for Bugcrowd
Bug Bounty – Roadmap for Open Bug Bounty
Bug Bounty – Roadmap for NCIIPC (Govt of India)
Bug Bounty – Roadmap for RVDP All Programs
Reporting Templates

Ethical HackingPenetration Testing Bug Bounty Hunting v2

Requirements

Basic IT Skills
No Linux, programming or hacking knowledge required.
Computer with a minimum of 4GB ram/memory & Internet Connection
Operating System: Windows / OS X / Linux

Description

Welcome to Ethical Hacking / Penetration Testing and Bug Bounty Hunting Course v2.0 . This course covers web application attacks and how to earn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.This course is not like other hacking or penetration testing course with outdated vulnerabilities and only lab attacks. This contains maximum live websites to make you comfortable with the Live Hunting Environment.This course will start from basic principles of each vulnerability and How to attack them using multiple bypass techniques, In addition to exploitation, you will also learn how to fix them.This course is highly practical and is made on Live websites to give you the exact environment when you start your penetrating testing or bug hunting journey.We will start from the basics of each vulnerability and move ahead to the advance level of exploitation and multiple edge case scenarios on live websites.This course is divided into a number of sections, each section covers how to hunt, exploit and mitigate a vulnerability in an ethical manner.After identification of a vulnerability, we will exploit to leverage the maximum severity out of it. We will also learn how to fix vulnerabilities which are commonly found on the websites on the internet.In this course, you will also learn How can you start your journey on many famous bug hunting platforms like Bugcrowd, Hackerone, Synack, Private RVDP, Intigriti, NCIIPC Govt of India and Open Bug Bounty.Along with this, you will be able to hunt and report vulnerabilities to NCIIPC Government of India, also to private companies and to their responsible disclosure programs.You will also learn Advance techniques to bypass filters and the developers logic for each kind of vulnerability. I have also shared personal tips and tricks for each attacks where you can trick the application and find bugs quickly.This course also includes the Breakdown of all Hackerone Reports which are found and submitted by other hackers for better understanding as we will cover each type of technique in the course.This course also includes important interview questions and answers which will be helpful in any penetration testing job interview.Here’s a more detailed breakdown of the course content:In all the sections we will start the fundamental principle of How the attack works, Exploitation and How to defend from those attacks.In Lab Setup, We will cover what is Burpsuite Proxy and Linux, also we will learn how to setup both for further pentesting and hunting.1. In Subdomain Takeovers, we will cover all different types of cloud based scenarios  like AWS, Github, Shopify, Tumblr and many more. In addition, we will learn Advance fingerprints and our newly made Can I take over all XYZ templates.We will see all the types of Subdomain takeovers attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for Subdomain Takeovers type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.In the end, I have added Interview Questions and answers which be helpful for you when Subdomain Takeovers questions are asked in any job or internship.2. In File Inclusion , we will cover all diff types of ways to attacks Linux and Windows based systems. We will cover Local and Remote File Inclusion Attacks. We will see all the types of File inclusion bypass on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform File Inclusion Exploitation using different techniques. We will also leverage our file inclusion to Remote Code Execution on live targets.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for File Inclusion type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.I have added Interview Questions and answers which be helpful for you when File Inclusion questions are asked in any job or internship.3. In Server Side Request Forgery SSRF Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities in multiple targets.We will see all the types of SSRF attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform SSRF Attacks Exploitation using multiple types by bypass tricks on targets.We will also learn how to scan the internal ports of the target vulnerable running server.We will also see the exploitation and download of the metadeta of the AWS Instances using SSRF which generally other researchers miss out.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for SSRF Attacks type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.4. In Remote Code Execution (RCE) Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities can lead to execution of malicious code on the target server.We will also cover different ways to perform code injection attacks on multiple targets to make you comfortable with different examples and test cases.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for RCE type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.5. In SQL Injection, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities can lead to Database Dumping & Sensitive Data Disclosure of other users.We will see all the types of SQLi attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform SQLi attacks and bypass SQLi protection on many live websites by using different WAF bypass payloads.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for SQLi type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.6. In HTML Injection, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities can lead to tricking users in visiting malicious websites and identify theft.We will see all the types of HTML Injection attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for HTML Injection type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.7. In Clickjacking, we will check this vulnerability for different targets, In addition, we will learn how to find these types of vulnerabilities can lead to sensitive actions on target websites.We will see all the types of Clickjacking attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for Clickjacking type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.8. In Broken Link Hijacking , we will check this vulnerability for different targets, In addition, we will learn how to find these types of vulnerabilities can lead to takeovers of files, accounts, media etc  on target websites.We will see all the types of BHL attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for BHL type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.You will also get additional BONUS sessions, in which I m going to share my personal approach for hunting bugs. All the videos are recorded on Live websites so that you understand the concepts as well as you get comfortable to work on a live environment. I have also added Interview Questions and answers for each attack which will be helpful for those are preparing for Job Interviews and Internships in the field of Information Security.With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you as soon as possible.Special Thanks to –  Ronit Bhatt, Vaibhav Lakhani, Ritika Keni, Pranav Bhandari and all other Hacktify Team Members for Vulnerability Disclosures POC’s & constant support.If you would like to contribute to us mail at – [email protected]:This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed.Testing any website which doesn’t have a Responsible Disclosure Policy is unethical and against the law, the author doesn’t hold any responsibility.

Overview

Section 1: Introduction

Lecture 1 Disclaimer

Section 2: Future Updates

Lecture 2 Future Updates

Section 3: Setting up Environment

Lecture 3 Burp Suite Proxy Lab Setup

Section 4: Subdomain Takeovers

Lecture 4 What are Subdomains

Lecture 5 Subdomain Enum

Lecture 6 What is DNS

Lecture 7 Fastest Resolver

Lecture 8 What are DNS Records

Lecture 9 Sublister

Lecture 10 Findomain

Lecture 11 Subfinder

Lecture 12 Recursive Subdomain Enumeration

Lecture 13 Can I take over XYZ

Lecture 14 Can I take over ALL XYZ

Lecture 15 AWS Subdomain Takeover Live -1

Lecture 16 AWS Subdomain Takeover Live -2

Lecture 17 AWS Bugcrowd Report Breakdown

Lecture 18 Tumblr Subdomain Takeover

Lecture 19 Shopify Subdomain Takeover

Lecture 20 Cargo Subdomain Takeover

Lecture 21 Subzy Tool Automation for Subdomain Takeovers

Lecture 22 Subjack – Tool for Subdomain Takeovers

Lecture 23 Subdomain Takeover Revision

Section 5: HTML Injection

Lecture 24 What is HTML

Lecture 25 Understanding HTML

Lecture 26 HTML

Lecture 27 HTML Injection – Lab

Lecture 28 HTML Injection Live-1

Lecture 29 HTML Injection Revision

Section 6: Click Jacking

Lecture 30 Click Jacking Live-1

Lecture 31 Click Jacking Live-2

Lecture 32 Click Jacking Live-3

Lecture 33 Click Jacking Live-4

Lecture 34 Clickjacking Exploitation

Lecture 35 Clickjacking Live Target Exploitation

Lecture 36 Clickjacking Automation Live Target Exploitation

Lecture 37 Clickjacking – ClickBandit with Burpsuite

Lecture 38 Clickjacking Revision

Section 7: File Inclusion Exploitation

Lecture 39 What is LFI

Lecture 40 LFI Exploitation on Lab

Lecture 41 LFI Exploitation Live -1

Lecture 42 LFI Exploitation Live -2

Lecture 43 LFI Exploitation LFi to RCE

Lecture 44 LFI vs RFI

Lecture 45 File Inclusion Exploitation Revision

Section 8: Broken Link Hijacking

Lecture 46 Introduction & Background Concept

Lecture 47 BLH Exploitation Practical

Lecture 48 BLH Exploitation Tool

Lecture 49 BLH Instagram Report Breakdown

Lecture 50 BLH Exploitation Practical Live

Lecture 51 BLH Hackerone Report Breakdown

Lecture 52 BLH Practical Tool Resource

Lecture 53 BLH Exploitation Practical Extension Tool

Lecture 54 BLH Command Injection

Lecture 55 BLH Exploitation Github Repo – Live

Lecture 56 Broken Link Hijacking Revision

Section 9: SQL Injection

Lecture 57 SQL Injection Background Concept

Lecture 58 SQL vs Spreadsheets

Lecture 59 SQL Database Importance

Lecture 60 XAMPP Installation & Setup

Lecture 61 SQL Practical Hands on – First Table

Lecture 62 SQL Practical Hands on – Queries

Lecture 63 SQL Practical Hands on – Second Table

Lecture 64 SQL Practical Hands on – Exercise

Lecture 65 Truth Table

Lecture 66 Truth Table Practical

Lecture 67 SQL Understanding the Logic

Lecture 68 SQL Query Breakdown

Lecture 69 SQL Injection Impact & Approach

Lecture 70 SQLi on Lab-1

Lecture 71 SQL Query Breakdown payload-2

Lecture 72 SQLi on Lab-2

Lecture 73 Burp suite Web Academy

Lecture 74 SQLi Labs Data Retrieval Lab

Lecture 75 SQLi Labs Data Retrieval Live

Lecture 76 SQLi Login Bypass Lab

Lecture 77 SQLi Login Bypass Live 1

Lecture 78 SQLMap Installation & Setup

Lecture 79 SQLMap Exploitation – Live 2

Lecture 80 SQLMap Exploitation – Live 3

Lecture 81 Shell Exploitation Techniques

Lecture 82 SQL : Shell Exploitation – Live 4

Lecture 83 SQLi Revision

Section 10: SSRF

Lecture 84 SSRF Introduction & Principle

Lecture 85 SSRF Practical

Lecture 86 SSRF Bincatcher Listener

Lecture 87 SSRF against Server Itself

Lecture 88 SSRF against another Backend Server

Lecture 89 SSRF Bypass Protection Blacklist Filter

Lecture 90 SSRF Bypass Protection Whitelist Filter

Lecture 91 SSRF Chaining with Open Redirect and Bypass Filter

Lecture 92 SSRF Exploitation using MPEG – Live

Lecture 93 SSRF Exploitation JIRA chaining with XSS – Live

Lecture 94 SSRF Exploitation JIRA chaining with XSS – Live

Lecture 95 SSRF Exploitation JIRA Automation with Python

Lecture 96 SSRF Facebook Breakdown

Lecture 97 SSRF Microstrategy Live -1

Lecture 98 SSRF PHP Filter Live

Lecture 99 SSRF PHP Filter WordPress Config Live

Section 11: Remote Code Execution

Lecture 100 Apache Unomi RCE Live

Section 12: How to start with Bug Bounty Platforms and Reporting

Lecture 101 BugCrowd ROADMAP

Lecture 102 Hackerone ROADMAP

Lecture 103 Open Bug Bounty ROADMAP

Lecture 104 Synack ROADMAP

Lecture 105 Intigriti ROADMAP

Lecture 106 NCIIPC Govt of India ROADMAP

Lecture 107 RVDP All Websites ROADMAP

Section 13: Bug Bounty / Penetration Testing Reporting Templates

Lecture 108 Reporting Templates – We have your back!

Anybody interested in learning website & web application hacking / penetration testing.,Any Beginner who wants to start with Penetration Testing,Any Beginner who wants to start with Bug Bounty Hunting,Trainer who are willing to start teaching Pentesting,Any Professional who working in Cyber Security and Pentesting,Ethical Hackers who wants to learn How OWASP Works,Beginners in Cyber Security Industry for Analyst Position,SOC person who is working into a corporate environment,Developers who wants to fix vulnerabilities and build secure applications

Course Information:

Udemy | English | 10h 1m | 4.29 GB
Created by: Shifa Cyclewala

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top