Skip to main content

Bug Bounty - An Advanced Guide to Finding Good Bugs

10h 26s
English
Paid

Course description

Bug bounties are evolving year after year and thousands of infosec enthuasiasts are looking to join the boat. Having a great place on that boat requires dedication and investing a great amount of time of work. In fact, there are multiple types of vulnerabilities and mastering the most important of these can be a game changer. In this class, attendees will learn the "how" and "why" of vulnerabilities they are already aware of instead of sticking to what the vulnerability is in general.

Read more about the course

This class will be based on real-life scenarios to show how to think out of the box in different scenarios to bring in the maximum impact.

During the session, students will have hands on excercises with:

  1. SQL Injection

  2. XXE

  3. SSRF

  4. RECON out of the box

  5. RCE

  6. SSTI

  7. Directory Traversal

  8. Access Control Vulns

  9. Authentication Issues

  10. Cache Poisoning

  11. Info Disclosure

  12. More subjects to be treated

Who Should Attend This Course

This course is intended for students with an interest in bug bounties, web vulnerability discovering and exploitation, or general infosec enthusiast who whish to know more about the side of bug bounties. Students should be comfortable with the type of vulnerabilities mentionned because we are not going to cover from a totaly beginner's side.

Watch Online

This is a demo lesson (10:00 remaining)

You can watch up to 10 minutes for free. Subscribe to unlock all 13 lessons in this course and access 10,000+ hours of premium content across all courses.

View Pricing

Watch Online Bug Bounty - An Advanced Guide to Finding Good Bugs

0:00
/
#1: Introduction and Table of Content

All Course Lessons (13)

#Lesson TitleDurationAccess
1
Introduction and Table of Content Demo
03:51
2
SQL Injection
01:16:59
3
XXE
59:59
4
SSRF
01:05:55
5
RCE
55:02
6
Thinking outside the b0x
45:29
7
Path Traversal
47:29
8
Access Control Issues
16:19
9
Authentication Issues
23:30
10
Cache Poisoning
14:30
11
Information Disclosure
05:39
12
Server Side Template Injection
10:08
13
Question & Answers
02:55:36

Unlock unlimited learning

Get instant access to all 12 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.

Learn more about subscription

Comments

0 comments

Want to join the conversation?

Sign in to comment

Similar courses

Operating Systems

Operating Systems

Sources: Oz Nova (csprimer.com)
The goal of this course is to help you understand the operating system, one of the most important pieces of software with which almost all programs interact.
29 hours 33 minutes 35 seconds
The Networking Bootcamp (CompTIA Network+ Certification)

The Networking Bootcamp (CompTIA Network+ Certification)

Sources: zerotomastery.io
Go from complete beginner to passing the CompTIA Network+ certification exam. You'll learn networking fundamentals, the latest best practices, and everything...
8 hours 39 minutes 57 seconds
The Effective Engineer, Pro Package

The Effective Engineer, Pro Package

Sources: Edmond Lau
Designed for those looking for an extra boost in their professional growth. You'll get for your own personal use: the book in PDF, Kindle, and ePub formats; the step-by-step com...
Automata Theory: inside a RegExp machine

Automata Theory: inside a RegExp machine

Sources: Dmitry Soshnikov
State machines — the fundamental concept used today in many practical applications, starting from UI programming like React, automated reply systems, lexical an
1 hour 48 minutes 5 seconds
Illusion Funnel

Illusion Funnel

Sources: Prodigies University
The strategy that helped Perrin launch all his businesses and acquire his first paying client without a product or service.