Description
In this course, you will learn:
- This path covers fundamental ideas in web application security assessment and bug bounty hunting, as well as a thorough grasp of the attack strategies employed during bug bounty hunting.
- Students will complete all stages of bug bounty hunting, from reconnaissance and bug identification to exploitation, documentation, and communication with vendors/programs, armed with the essential theoretical knowledge, many practical exercises, and a proven bug bounty hunting technique.
- Upon completion of this job role route, you will be proficient in the most common bug bounty hunting and attack methodologies against web applications, as well as capable of professionally reporting bugs to a vendor.
Syllabus:
- Web Requests
- Intoduction to web applications
- Using Web Proxies
- Information Gathering - Web Edition
- Attacking Web Applications with Ffuf
- JavaScript Deobfuscation
- SQL Injection Fundamentals
- SQLMap Essentials
- Command Injections
- File Upload Attacks
- Server-side Attacks
- Login Brute Forcing
- Broken Authentication
- Web Attacks
- File Inclusion
- Session Security
- Web Service & API Attacks
- Hacking WordPress
- Bug Bounty Hunting Process