Web Security & Bug Bounty Learn Penetration Testing in 2023
10h 28m 11s
English
Paid
Course description
Start a career or earn a side income by becoming a Bug Bounty Hunter. No experience needed. Hack websites, fix vulnerabilities, improve web security and much more. You'll learn penetration testing from scratch and master the most modern pentesting tools & best practices for 2021!
Read more about the course
- Learn Penetration Testing from scratch to become a bug bounty hunter and web security expert
- Setting Up Your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
- Learn How To Hack & Attack Systems With Known Vulnerabilities
- Bug Hunter and the Burpsuite Tool
- Command Injection/Execution
- Bruteforce Attacks
- Security Misconfiguration
- SQL Injection
- Logging & Monitoring Best Practices
- Networking Fundamentals
- Discover, exploit, and mitigate all types of web vulnerabilities. Secure any of your future applications using best practices
- How to make money from bug bounty hunting and make a career of it
- Website Enumeration & Information Gathering
- HTML Injections
- Broken Authentication
- Broken Access Control
- Cross Site Scripting - XSS
- XML, XPath Injection, XXE
- Web Fundamentals
- Linux Terminal Fundamentals
Watch Online
0:00
/ #1: Course Outline
All Course Lessons (87)
| # | Lesson Title | Duration | Access |
|---|---|---|---|
| 1 | Course Outline Demo | 06:10 | |
| 2 | Join Our Online Classroom! | 04:02 | |
| 3 | What is Penetration Testing ? | 05:44 | |
| 4 | What is Bug Bounty ? | 06:36 | |
| 5 | ZTM Resources | 04:24 | |
| 6 | Virtual Box, Kali Linux Download | 11:10 | |
| 7 | Important - New Kali Linux Categories | 01:27 | |
| 8 | Kali Linux Installation | 12:15 | |
| 9 | OWASPBWA Installation | 08:36 | |
| 10 | Creating TryHackMe Account | 02:48 | |
| 11 | 2 Paths | 02:06 | |
| 12 | Website Enumeration - Theory | 05:01 | |
| 13 | Google Dorks | 11:29 | |
| 14 | Ping, Host, Nslookup ... | 07:22 | |
| 15 | Whatweb | 08:53 | |
| 16 | Dirb | 06:21 | |
| 17 | Nmap | 11:29 | |
| 18 | Nikto | 06:33 | |
| 19 | Burpsuite Configuration | 07:48 | |
| 20 | Burpsuite Intercept | 07:28 | |
| 21 | Burpsuite Repeater | 07:49 | |
| 22 | Burpsuite Intruder | 09:21 | |
| 23 | HTML Injection - Theory | 03:25 | |
| 24 | HTML Injection 1 on TryHackMe | 09:02 | |
| 25 | HTML Injection 2 - Injecting User-Agent Header | 03:50 | |
| 26 | Injecting Cookie Field and Redirecting The Page | 05:24 | |
| 27 | Advance Example of HTML Injection | 13:19 | |
| 28 | Command Injection Theory | 04:15 | |
| 29 | Command Injection On TryHackMe and Blind Command Injection | 09:56 | |
| 30 | Solving Challenges With Command Injection | 09:31 | |
| 31 | Running PHP Reverse Shell With Command Execution Vulnerability | 07:27 | |
| 32 | Bypassing Input Filter And Executing Command | 07:26 | |
| 33 | Broken Authentication Theory | 04:24 | |
| 34 | Broken Authentication On TryHackMe | 06:01 | |
| 35 | Broken Authentication Via Cookie | 04:31 | |
| 36 | Basic Authorization in HTTP Request | 06:35 | |
| 37 | Forgot Password Challenge | 08:22 | |
| 38 | Session Fixation Challenge | 05:10 | |
| 39 | Cluster Bomb Bruteforce | 06:39 | |
| 40 | Hydra Bwapp Form Bruteforce | 12:21 | |
| 41 | Hydra Post Request Form Bruteforce | 05:25 | |
| 42 | Extra - Hydra SSH Attack | 04:16 | |
| 43 | Sensitive Data Exposure Example | 10:12 | |
| 44 | Broken Access Control - Theory | 06:28 | |
| 45 | Accessing passwd With BAC | 04:25 | |
| 46 | Ticket Price IDOR | 06:34 | |
| 47 | Security Misconfiguration - Default App Credentials | 04:42 | |
| 48 | Exercise: Imposter Syndrome | 02:57 | |
| 49 | XSS Theory | 06:13 | |
| 50 | Changing Page Content With XSS | 10:54 | |
| 51 | Bypassing Simple Filter | 03:49 | |
| 52 | Downloading a File With XSS Vulnerability | 09:06 | |
| 53 | DOM XSS Password Generator | 05:36 | |
| 54 | JSON XSS | 08:10 | |
| 55 | Old Vulnerable Real Applications | 04:12 | |
| 56 | SQL Injection Theory | 04:01 | |
| 57 | Guide To Exploiting SQL Injection | 08:01 | |
| 58 | Getting Entire Database | 05:26 | |
| 59 | Extracting Passwords From Database | 19:44 | |
| 60 | Bypassing Filter In SQL Query | 06:07 | |
| 61 | Blind SQL Injection | 11:39 | |
| 62 | XPath Injection | 06:24 | |
| 63 | XPath Injection 2 | 03:58 | |
| 64 | XXE | 07:23 | |
| 65 | Components With Known Vulnerabilities Example | 10:07 | |
| 66 | Insufficient Logging And Monitoring Example | 04:02 | |
| 67 | Whats Next & How To Earn Money By Finding Vulnerabilities ? | 11:36 | |
| 68 | Browsing the Web | 06:01 | |
| 69 | Breaking Google | 03:01 | |
| 70 | The Internet Backbone | 05:30 | |
| 71 | Traceroute | 02:25 | |
| 72 | HTML, CSS, Javascript | 05:05 | |
| 73 | Build Your First Website | 07:49 | |
| 74 | HTML Tags | 08:40 | |
| 75 | Your First CSS | 13:43 | |
| 76 | What Is Javascript? | 05:34 | |
| 77 | Your First Javascript | 11:42 | |
| 78 | Javascript On Our Webpage | 09:06 | |
| 79 | HTTP/HTTPS | 19:59 | |
| 80 | Introduction To Databases | 10:55 | |
| 81 | SQL: Create Table | 05:16 | |
| 82 | SQL: Insert Into + Select | 04:34 | |
| 83 | What is PHP? | 05:17 | |
| 84 | Linux 1 - ls, cd, pwd, touch... | 13:47 | |
| 85 | Linux 2 - sudo, nano, clear ... | 07:01 | |
| 86 | Linux 3 - ifconfig, nslookup, host ... | 07:35 | |
| 87 | Thank You | 01:14 |
Unlock unlimited learning
Get instant access to all 86 lessons in this course, plus thousands of other premium courses. One subscription, unlimited knowledge.
Learn more about subscriptionComments
0 commentsWant to join the conversation?
Sign in to commentSimilar courses
NativeScript + Angular: Build Native iOS, Android & Web Apps
Sources: udemy
With Angular (2+), you can already build highly reactive and engaging web apps. Wouldn't it be amazing to use that same tech stack and knowledge to build real native mobile apps...
20 hours 11 minutes 23 seconds
Design Microservices Architecture with Patterns & Principles
Sources: udemy
In this course, we’re going to learn how to Design Microservices Architecture with using Design Patterns, Principles and the Best Practices with Iterate Design
17 hours 26 minutes 52 seconds
AlgoExpert | Become an Algorithms Expert
Sources: algoexpert
Become an Expert in Algorithms. 65 videos explaining popular interview questions with solutions in JavaScript, Python, C ++, Java, and Go. Practice with popular questions. Topic...
116 hours 40 minutes 8 seconds
Zero to Full Stack Hero
Sources: papareact.com
PAPA React presents.. Zero to Full Stack Hero. It's NOT just another COURSE. It's the world's BEST COMMUNITY. From learning the Basics of Web Development to Mastering React!
101 hours 29 minutes 59 seconds
Super Study Guide: Transformers & Large Language Models
Sources: Shervine Amidi, Afshine Amidi
The book "Super Study Guide: Transformers & Large Language Models" is a concise and visual guide for those who want to understand the structure of large...