Bug Bounty - An Advanced Guide to Finding Good Bugs

10h 26s
English
Paid

Bug bounties are evolving year after year and thousands of infosec enthuasiasts are looking to join the boat. Having a great place on that boat requires dedication and investing a great amount of time of work. In fact, there are multiple types of vulnerabilities and mastering the most important of these can be a game changer. In this class, attendees will learn the "how" and "why" of vulnerabilities they are already aware of instead of sticking to what the vulnerability is in general.

Read more about the course

This class will be based on real-life scenarios to show how to think out of the box in different scenarios to bring in the maximum impact.

During the session, students will have hands on excercises with:

  1. SQL Injection

  2. XXE

  3. SSRF

  4. RECON out of the box

  5. RCE

  6. SSTI

  7. Directory Traversal

  8. Access Control Vulns

  9. Authentication Issues

  10. Cache Poisoning

  11. Info Disclosure

  12. More subjects to be treated

Who Should Attend This Course

This course is intended for students with an interest in bug bounties, web vulnerability discovering and exploitation, or general infosec enthusiast who whish to know more about the side of bug bounties. Students should be comfortable with the type of vulnerabilities mentionned because we are not going to cover from a totaly beginner's side.

Watch Online Bug Bounty - An Advanced Guide to Finding Good Bugs

Join premium to watch
Go to premium
# Title Duration
1 Introduction and Table of Content 03:51
2 SQL Injection 01:16:59
3 XXE 59:59
4 SSRF 01:05:55
5 RCE 55:02
6 Thinking outside the b0x 45:29
7 Path Traversal 47:29
8 Access Control Issues 16:19
9 Authentication Issues 23:30
10 Cache Poisoning 14:30
11 Information Disclosure 05:39
12 Server Side Template Injection 10:08
13 Question & Answers 02:55:36

Similar courses to Bug Bounty - An Advanced Guide to Finding Good Bugs

The Complete Guide to Becoming a Software Architect

The Complete Guide to Becoming a Software Architectudemy

Category: Others
Duration 5 hours 44 minutes 32 seconds
Automata Theory: inside a RegExp machine

Automata Theory: inside a RegExp machineDmitry Soshnikov

Category: Others
Duration 1 hour 48 minutes 5 seconds
Production-Ready Serverless

Production-Ready ServerlessYan Cui

Category: AWS, Others
Duration 13 hours 37 minutes 6 seconds
The Complete Cyber Security Course : Hackers Exposed!

The Complete Cyber Security Course : Hackers Exposed!udemy

Category: Ethical Hacking / Penetration Testing, IT security
Duration 12 hours 6 minutes 52 seconds
Master the Pathfinding Algorithms with JavaScript and React

Master the Pathfinding Algorithms with JavaScript and Reactzerotomastery.io

Category: Others
Duration 2 hours 30 minutes 4 seconds
Illusion Funnel

Illusion FunnelProdigies University

Category: Others
Duration
Cisco CCNA 200-125 – The Complete Guide to Getting Certified

Cisco CCNA 200-125 – The Complete Guide to Getting Certifiedudemy

Category: Others
Duration 38 hours 48 minutes 8 seconds
Create a Retirement Planning Tool with Excel

Create a Retirement Planning Tool with Excelzerotomastery.io

Category: Others
Duration 2 hours 51 minutes 33 seconds
Break Into Tech And Become A Software Engineer

Break Into Tech And Become A Software EngineerBrian Jenney

Category: Others
Duration 1 hour 49 minutes 25 seconds
Building AI Apps with the Gemini API

Building AI Apps with the Gemini APIzerotomastery.io

Category: Others
Duration 3 hours 43 minutes 41 seconds