Bug bounties are evolving year after year and thousands of infosec enthuasiasts are looking to join the boat. Having a great place on that boat requires dedication and investing a great amount of time of work. In fact, there are multiple types of vulnerabilities and mastering the most important of these can be a game changer. In this class, attendees will learn the "how" and "why" of vulnerabilities they are already aware of instead of sticking to what the vulnerability is in general.
Bug Bounty - An Advanced Guide to Finding Good Bugs
This class will be based on real-life scenarios to show how to think out of the box in different scenarios to bring in the maximum impact.
During the session, students will have hands on excercises with:
SQL Injection
XXE
SSRF
RECON out of the box
RCE
SSTI
Directory Traversal
Access Control Vulns
Authentication Issues
Cache Poisoning
Info Disclosure
More subjects to be treated
Who Should Attend This Course
This course is intended for students with an interest in bug bounties, web vulnerability discovering and exploitation, or general infosec enthusiast who whish to know more about the side of bug bounties. Students should be comfortable with the type of vulnerabilities mentionned because we are not going to cover from a totaly beginner's side.
About the Author: udemy
Udemy is a global online marketplace for teaching and learning. It connects students with instructors who share skills in many fields.
Who Uses Udemy
Millions of learners use Udemy to gain skills for work and personal growth. Companies, governments, and nonprofits also use Udemy to train their teams.
What Udemy Offers
Udemy provides a curated set of business and technical courses. These courses help teams build practical skills and support ongoing learning at work.
Watch Online 13 lessons
| # | Lesson Title | Duration | Access |
|---|---|---|---|
| 1 | Introduction and Table of Content Demo | 03:51 | |
| 2 | SQL Injection | 01:16:59 | |
| 3 | XXE | 59:59 | |
| 4 | SSRF | 01:05:55 | |
| 5 | RCE | 55:02 | |
| 6 | Thinking outside the b0x | 45:29 | |
| 7 | Path Traversal | 47:29 | |
| 8 | Access Control Issues | 16:19 | |
| 9 | Authentication Issues | 23:30 | |
| 10 | Cache Poisoning | 14:30 | |
| 11 | Information Disclosure | 05:39 | |
| 12 | Server Side Template Injection | 10:08 | |
| 13 | Question & Answers | 02:55:36 |
Get instant access to all 12 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.
Learn more about subscription