Bug Bounty – Web Application Penetration Testing

Shivam Giri
Shivam Giri
Last Update August 9, 2021
5.0 /5
(3)
1 already enrolled

About This Course

The contents of this course are not covered in any of my other courses except for some basics. Although website hacking is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, more vulnerabilities, advanced exploitation, advanced post exploitation, bypassing security and more!

Welcome to my this comprehensive course on Website penetration testing. In this course you’ll learn website / web applications hacking & Bug Bounty hunting! This course assumes you have NO prior knowledge in hacking, and by the end of it you’ll be at a high level, being able to hack & discover bugs in websites like black-hat hackers and secure them like security experts!

This course is highly practical but it won’t neglect the theory, first you’ll learn how to install the needed software (on Windows, Linux and Mac OS X) and then we’ll start with websites basics, the different components that make a website, the technologies used, and then we’ll dive into website hacking straight away. From here onwards you’ll learn everything by example, by discovering vulnerabilities and exploiting them to hack into websites, so we’ll never have any dry boring theoretical lectures.

Before jumping into hacking, you’ll first learn how to gather comprehensive information about the target website, then the course is divided into a number of sections, each section covers how to discover, exploit and mitigate a common web application vulnerability, for each vulnerability you will first learn the basic exploitation, then you will learn advanced techniques to bypass security, escalate your privilegesaccess the database, and even use the hacked websites to hack into other websites on the same server.

All of the vulnerabilities covered here are very common in bug bounty programs, and most of them are part of the OWASP top 10.

You will learn how and why these vulnerabilities are exploitable, how to fix them and what are the right practices to avoid causing them.

Curriculum

32 Lessons

Introduction of Web Application Penetration Testing

Introduction of Web Application6:33
Top 10 Owasp8:05

Setup environment for web application penetration testing

Preparation – Linux Basics

Information Gathering

Burpsuite – Penetration testing toolkit.

Cross Site Scripting Vulnerability

SQL Injection Vulnerability

File Upload Vulnerability

File Upload Vulnerability – Exploitation

URL Redirection Vulnerability

HTML Injection Vulnerability

File Inclusion Vulnerability

Command Injection Vulnerability

Source Code Disclosure

Server Side Request Forgery

Host Header Injection Vulnerability

Critical File Found Vulnerability

Your Instructors

Shivam Giri

Founder & CEO

5.0/5
7 Courses
19 Reviews
373 Students
Shivam Giri, the founder of Cyber Yodha, is a passionate entrepreneur and entertaining influencer. He is a staunch advocate for ethical hacking and cyber security measures. He is a strong supporter of ethical hacking and cyber security. He hopes to pass on his practical knowledge and skills in the field of information security. Shivam Giri is an ethical hacking educator who is extremely enthusiastic about his work. Students, job seekers, professionals, entrepreneurs, and others benefit from his instruction. They offer training and services both domestically and internationally. Career Shivam Giri started his career through freelancing in 2017 when he was only 18 years old. After this Shivam formed his own online Ethical Hacking Institute. In which he used to provide online ethical hacking workshops. Have potential to attain the satisfaction to offer quality work. On the Professional basis have worked with various Organisation in Education, Entertainment, Real States, E-commerce, Corporate and other Sector Now Shivam has trained more than 4600+ peoples across India. He has own team. Shivam gives seminars in different-different collages, companies, schools on Cyber Security Awareness Programs About Cyber Yodha Cyber Yodha was founded with a vision to make learning easier and accessible. From over 30 courses for both Classroom Training and Online Programs, we make sure that each student receives the best education. The complete course structure is verified and taught by certified instructors with a main objective to create a inclusive learning experience. The perfect choice when it comes to adding something extra to your profile or brushing up on your existing knowledge. Each course has its set of challenges and quizzes for a thorough assessment. Talk to our consultants for a walk through and start your learning journey today
See more

Student Feedback

5.0
3 Ratings
100%
0%
0%
0%
0%

Reviews (3)

Best Course for Bug Bounty Hunters

This is best course for Bug bounty hunting . I love the way of explaining

Bast of bast

Write a review

Bug Bounty

30,000.0040,000.00

25% off
Level
Intermediate
Lectures
32 lectures
Subject
Enrollment validity: Lifetime

Related Courses

-65%
Basic Ethical Hacking
Ethical Hacking Masterclass

499.001,431.00

-29%
What is Hacking and Scope of Ethical Hacking by analystshivam

Want to receive push notifications for all major on-site activities?