Bug Bounty – Web Application Penetration Testing

Shivam Giri
Last Update August 9, 2021
5.0 /5
(3)
1 already enrolled

About This Course

The contents of this course are not covered in any of my other courses except for some basics. Although website hacking is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more vulnerabilities, advanced exploitation, advanced post exploitation, bypassing security and more!

Welcome to my this comprehensive course on Website penetration testing. In this course you’ll learn website / web applications hacking & Bug Bounty hunting! This course assumes you have NO prior knowledge in hacking, and by the end of it you’ll be at a high level, being able to hack & discover bugs in websites like black-hat hackers and secure them like security experts!

This course is highly practical but it won’t neglect the theory, first you’ll learn how to install the needed software (on Windows, Linux and Mac OS X) and then we’ll start with websites basics, the different components that make a website, the technologies used, and then we’ll dive into website hacking straight away. From here onwards you’ll learn everything by example, by discovering vulnerabilities and exploiting them to hack into websites, so we’ll never have any dry boring theoretical lectures.

Before jumping into hacking, you’ll first learn how to gather comprehensive information about the target website, then the course is divided into a number of sections, each section covers how to discover, exploit and mitigate a common web application vulnerability, for each vulnerability you will first learn the basic exploitation, then you will learn advanced techniques to bypass security, escalate your privilegesaccess the database, and even use the hacked websites to hack into other websites on the same server.

All of the vulnerabilities covered here are very common in bug bounty programs, and most of them are part of the OWASP top 10.

You will learn how and why these vulnerabilities are exploitable, how to fix them and what are the right practices to avoid causing them.

Curriculum

32 Lessons

Introduction of Web Application Penetration Testing

Introduction of Web Application6:33
Top 10 Owasp8:05

Setup environment for web application penetration testing

Preparation – Linux Basics

Information Gathering

Burpsuite – Penetration testing toolkit.

Cross Site Scripting Vulnerability

SQL Injection Vulnerability

File Upload Vulnerability

File Upload Vulnerability – Exploitation

URL Redirection Vulnerability

HTML Injection Vulnerability

File Inclusion Vulnerability

Command Injection Vulnerability

Source Code Disclosure

Server Side Request Forgery

Host Header Injection Vulnerability

Critical File Found Vulnerability

Your Instructors

Shivam Giri

Founder & CEO

5.0/5
6 Courses
14 Reviews
236 Students
See more

Student Feedback

5.0
3 Ratings
100%
0%
0%
0%
0%

Reviews (3)

Best Course for Bug Bounty Hunters

This is best course for Bug bounty hunting . I love the way of explaining

Bast of bast

Write a review

Bug Bounty

30,000.0040,000.00

25% off
Level
Intermediate
Lectures
32 lectures
Subject

Enrolment validity: Lifetime

Related Courses

-67%
Ethical Hacking Workshop
Ethical Hacking Workshop

999.003,000.00

-29%
Become Certified Ethical Hacker
Wishlist 0
Open wishlist page Continue shopping