The Super-Sized Ethical Hacking Bundle

5 Reviews
6674 Enrolled
9 Courses & 78 Hours
$43.00$1,080.00
You save 96% -

What's Included

Bug Bounty: Web Hacking
  • Certification included
  • Experience level required: All levels
  • Access 72 lectures & 5.5 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

72 Lessons (5.5h)

  • Let's Get Started
    Introduction1:14
    Github2:53
  • Tools
    Vega5:50
    Setting up Atmosphere5:11
    Nikto
    Sub domain5:39
    Recon ng9:29
    knockpy3:04
    Nmap5:59
    Burp Suite Cont.4:50
    spider6:51
    scanner7:07
    Intruder6:23
    Authorization4:29
    BWap5:37
    wapplayzer4:53
    firebug3:10
    Hack bar3:45
    User agent Switcher2:42
    Sublist3r3:46
    Repeater3:59
    Sequencer4:29
    Analyzing Sequencer Data3:59
    Decoder2:07
    Comparer2:13
    Save and Restore3:46
  • WordPress Hacking
    WP Scan4:40
    WP Scan Codex5:03
    WP Scan Template Monster7:49
    WP Scan User1:19
    CMS Map2:50
  • Cross-site Scripting(XSS)
    XSS Demo2:54
    XSS Lenovo Yahoo1:45
    XSS Uber2:53
    XSS Paypal1:53
    XSS Whatsapp Facebook1:56
    Counter Measures for XSS2:36
  • SQL Injection(SQLi)
    SQL Drupal2:33
    Facebook SQL Injection2:00
    Counter Measures for SQL3:02
    Template Injection1:54
  • Clickjacking
    Clickjacking2:37
    Clickjacking Report1:31
    Clickjacking Injection Similar Report1:27
    IFrame Demo1:03
  • Open Redirect Vulnerablility
    Open Redirect Report2:20
    Open Redirect Similar Report1:20
  • Cross-site Request Forgery(CSRF)
    CSRF(change password) demo1:23
    CSRF Injection2:13
    CSRF Townwars1:11
    CRF Badoo2:07
    CRLF Injection Similar Report1:32
    Shellshock1:23
    SSRF1:42
    SSRF Similar Report1:48
  • Full Path Disclosure
    Full Path Disclosure2:01
    Full Path Disclosure Report1:14
    Full Path Disclosure Similar Report1:09
    Insecure Cryptographic Srorage2:06
    Insecure Direct object References2:25
  • Broken Authentication and Session Management
    Autorize4:32
    Broken Auth - Insecure Login Forms Demo1:32
    Privilege2:01
    Privilege Bookfresh1:42
    Testing for Privilege Manipulation2:03
    Session Mgmt - Administrative Portals0:56
    Session Report3:06
    Application Logic Report2:11
    Application Logic Similar Report1:35
  • HTML Injection
    HTML Injection Report2:34
    HTML Injection similar Report1:20
    HTML Injection Demo2:25
    XML External Entity1:53
    XXE Similar Reports1:24
  • Sub Domain take Over
    Sub Domain Take Over3:21
    Sub Domain Take over Report1:59
    Remote file Insulation1:40
  • Remote code Execution
    Remote Code Execution1:51
    Remote Code Execution Similar Reports1:12
    Cookies3:42
    crt.sh1:40
    Sensitive Data Exposure2:12
    Buffer overflow3:48
    Buffer overflow Similar Reports1:33
    IDOR1:50
    IDOR Similar Report1:23
    DNS Miconfiguration2:29
    DNS Misconfiguration Similar Reports1:37
  • Denail of Service (DoS)
    Denail of Service(DoS)2:33
    DOS Report2:00
    DOS Similar Reports1:37
    Finding Report using Google4:23
    Searching Similar Reports2:12
    HTTP Parameter Pollution1:46
    OSINT1:58
  • Methodology
    Methodology5:01
    02 Analyze the Application1:57
    03 Test Client-side Controls2:22
    04 Authentication Mechanism2:49
    05 Test Session3:47
    06 Test Access Control2:02
    07 Test for Input-based Vulnerabilities3:02
    08 test Access Control3:59
    09 Test for Logic Flaws2:18
    10 Test for Logic Flaws1:23
    11 Test for Application Server Vulnerabilities4:30
    12 Miscellaneous Checks3:17
    13 Follow up Any information Leakage2:16
    Reporting Vulnerability 14:29
    Reporting Vulnerability 23:43

Bug Bounty: Web Hacking

AH
Amit Huddar

Amit Huddar is an Internet Entrepreneur and Software Engineer. He runs his own software company "Softdust," which develops products for new technologies like wearables and other gadgets. He opted for computer science engineering in 2013 at SSIT and started his software company in his first year of engineering.

His skills include: Android app development, HTML, CSS, PHP, C, C++, JAVA, Linux, Building Custom Linux OS, Cloud Computing. Penetration testing, Kali Linux and Hacking.

Description

Did you know you can make money identifying and fixing bugs on some of the biggest web apps on earth? Last year, Facebook paid $5 million to independent hackers while Google paid over $6 million as part of their bug bounty programs. And they're far from alone. In this course, you'll learn how to legally hack major companies like Facebook, Google, and PayPal and get paid to do it.

  • Access 72 lectures & 5.5 hours of content 24/7
  • Learn how to get paid for hacking & disclosing bugs to major companies
  • Get familiar w/ Burp Suite, browser plugins, & Kali Linux
  • Explore types of vulnerability such as SQL, XSS, CSRF injection, & more
  • Discover the methodology for performing bug bounty

Specs

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.