Bug Bounty Hunting or Web Application Pentesting for 2021
- Description
- Curriculum
- FAQ
- Reviews
Welcome to Web Application Penetration Testing or Bug Bounty Hunting course. This course will take you from basics to an intermediate level where you will be able to make some money by hacking, yeah it’s very interesting. Imagine making money by doing a thing we love to do.
How I get Started
First like all others I went to google and searched for what is bug bounty and how to get started in bug bounty I couldn’t find what I wanted then I searched for web application pentesting and found many courses and resources out there and learned about all of them.
After learning about many vulnerabilities I went to a real world application and I was stuck with doing nothing, I didn’t know what to test where to test or anything. I didn’t know what should I do after selecting a domain to hack, that’s the main problem I came across during my journey. Literally none of the resources or courses showed me the answer. It took me a while to understand.
So I decided to include that also at the end of the course i.e what should we do after picking up the target. I can assure you that, you won’t be stuck like me while start hacking if you purchased this course.
One more thing that I coudn’t realize was that how to report or where to report and I didn’t heard of the platforms out there at that time, might be because of no previous knowledge in this area. So I mentioned in this course that how can we find websites that have bug bounty programs and platforms and external programs too.
I was able to find my first ever paid bug within 2 months without any previous knowledge. When I post that on twitter thanking all the hackers out there I started getting messages asking how I learned so fast and how am I hunting. This made me starting a medium blog and then got messages from people telling “Thank you I was able to find my first bug as in the blog” The blog isn’t a big one but it contains vulnerabilities that you can easily find without any previous knowledge. So I thought it will be great if I could make a video course for absolute beginners to become good hackers and earn money by hacking websites.
Now my name is listed in Hall of Fames of various programs and was able to find critical vulnerabilities so that I can earn more in that way.
Each Section and lectures have a description of what we are going to learn on that particular section or lecture so that if you are already familiar with that area you can skip that portion.
-
2Installing VMWareVideo lesson
In this video we will download and install VMWare workstation player to install another os inside our current os
-
3Installing Kali linux inside VMWareVideo lesson
We will download and install Kali linux inside our Vmware
-
4Installing metasploitableVideo lesson
Metasploitable is virtual machine based on Linux that contains several intentional vulnerabilities for you to exploit. Metasploitable is essentially a penetration testing lab in a box, available as a VMware virtual machine
-
5Kali linux appearence changingVideo lesson
-
8Basics of WebVideo lesson
In this we will discuss about the basics and how the web works
-
9OWASP Top 10Video lesson
OWASP Top 10 is the list of the 10 most common application vulnerabilities. It also shows their risks, impacts, and countermeasures. Updated every three to four years, the latest OWASP vulnerabilities list was released in 2018. Let’s dive into it!
-
10Installing goVideo lesson
Go is a statically typed, compiled programming language designed at Google.
Just like python so many tools we are using are written in go so in order to install and work them we need golang go installed in our kali machine.
-
11Installing some tools in kali linuxVideo lesson
We will install some tools used in our hunting
-
12Installing nucleiVideo lesson
Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
Nuclei is used to send requests across targets based on a template leading to zero false positives and providing effective scanning for known paths. Main use cases for nuclei are during initial reconnaissance phase to quickly check for low hanging fruits or CVEs across targets that are known and easily detectable. It uses retryablehttp-go library designed to handle various errors and retries in case of blocking by WAFs, this is also one of our core modules from custom-querie
-
13Introduction and setting it up with our browserVideo lesson
Introduction to Burpsuite
How it works and why we are using it
Setting up
We have to configure burp with our browser in order to proxy it. so this video will show you how to set them up easily
-
14All about burp - Explaining tabs of burpsuiteVideo lesson
In this lecture we will learn about using burpsuite, explained all functionalities of burp
-
15Working of a bug bounty programVideo lesson
A simple explanation about how bug bounties are working
-
16Hackerone-ExplainedVideo lesson
-
17Bugcrowd-ExplainedVideo lesson
Bugcrowd is a well known bug bounty platform and this video will explain about everything
-
18External Bug Bounty ProgramsVideo lesson
Other than public bug bounty platforms like hackerone and bugcrowd many companies have their own bug bounty or responsible disclosure programs and here we will how to find them how can we report on them
-
19Command Injection -part 1Video lesson
Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell
-
20Command Injection -part 2Video lesson
-
21Labs to Practice Command InjectionVideo lesson
After we learned about it's working and more, we have to practice more than we have done here so for that I will show you some labs that you can practice to learn more
-
22File Upload Vulnerability - Part 1Video lesson
We will exploit the functionality to upload a reverse shell to the server and will see how to get a connection back to our system
-
23Bypassing Restrictions on File UploadVideo lesson
Sometimes websites restrict users from uploading files other than required one's such as in case of profile pictures they may restrict users from uploading files other than image type like jpg,png etc. So in this lecture we will learn the methods of bypassing them
-
24Disclosed reports about File Upload vulnerabilitiesVideo lesson
Will go through some hackerone disclosed reports and so that we can learn many more methods of exploiting the upload functionality
-
25Local file inclusionVideo lesson
An attacker can use Local File Inclusion (LFI) to trick the web application into exposing or running files on the web server. So sometimes we can read sensitive files inside the web server which is mostly considered as a critical vulnerability
-
26Local file Inclusion to Remote Code Execution -1Video lesson
Other than just accessing or reading sensitive files we might be able to read some files such as logs which we can change the values and add arbitory codes to them and as a result we will be able to get the complete access of the computer that hosts the website. So this lecture will teach you how to do that.
-
27Local File Inclusion to Remote Code Execution - 2Video lesson
As in the previous lecture we have seen converting LFI into an RCE and this is also same with another file or we can say another method
-
28Remote File Inclusion - Part 1Video lesson
Using remote file inclusion (RFI), an attacker can cause the web application to include a remote file. This is possible for web applications that dynamically include external files or scripts. Potential web security consequences of a successful RFI attack range from sensitive information disclosure and Cross-site Scripting (XSS) to remote code execution and, as a final result, full system compromise
-
29Remote File Inclusion - Part 2Video lesson
-
30Information Leak on GithubVideo lesson
Developers often leaks sensitive data in the Github Repositories mostly by mistake, they may include api keys, admin credentials, PII info, and many more. After this lecture you will be able to find them out easily
-
31Infomation Leakage on the application -1Video lesson
There might be sensitive files or other credentials exposed to public or may be in script files, let's discuss about them
-
32Information Leakage on the application -2Video lesson
-
33Introduction to XSSVideo lesson
Cross-site scripting is a type of security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. If you are unfamiliar with them this will give you an introduction to XSS
-
34Reflected XSSVideo lesson
Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and includes that data within the immediate response
-
35Stored XSSVideo lesson
Stored cross-site scripting (also known as second-order or persistent XSS) arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way.
-
36XSS Practice -1Video lesson
We all know the best way to learn in depth is to practice more and now we are going to practice more and more
-
37XSS Practice -2Video lesson
-
38XSS Practice -3Video lesson
-
39XSS Practice -4Video lesson
-
40Google XSS ChallengeVideo lesson
-
41Introduction to SQL InjectionVideo lesson
SQL injection usually occurs when you ask a user for input, like their username/userid, and instead of a name/id, the user gives you an SQL statement that you will unknowingly run on your database.
-
42Finding Injection Points and DataBase EnumerationVideo lesson
After this lecture you will be able to find the injection points and run basis SQL queries
-
43Gathering More InformationVideo lesson
In this lecture we will learn how to find more details of database and other server info
-
44Enumerating Databases and TablesVideo lesson
This lecture will show you how to find the names of databases and tables on the server after finding an injection point.
-
45Finding Username and Passwords from the DatabaseVideo lesson
After enumerating database and tables we need to try to read inputs inside tables to find info such as usernames and passwords of all the users
-
46SQL Injection into Local File InclusionVideo lesson
Now we have learned about SQL injection and LFI also. Other than just reading inside database we might be able to read files inside the server. This lecture will show to do that.
-
47Automating SQL Injection with SqlmapVideo lesson
Everything we have done in this section is by manual, and this can be easily automated with tools installed on our kali machine.
And this lecture will deal with how to automate SQL injection
-
48Blind SQL InjectionVideo lesson
Blind SQL injection is a type of SQL Injection attack that asks the database true or false questions and determines the answer based on the applications response. This makes exploiting the SQL Injection vulnerability more difficult, but not impossible so let's see how it's done
-
49Bruteforcing username and passwordVideo lesson
-
50Bruteforcing with hydraVideo lesson
-
51Account takeovers by bruteforcingVideo lesson
-
52Finding usernames and passwords by bruteforcingVideo lesson
-
53Account Takeover by password reset functionalityVideo lesson
-
54Account Takeover by password reset functionality -2Video lesson
-
55Account Takeover by Password reset functionality -3Video lesson
-
56Other methods of Account TakeoversVideo lesson
-
57Live demonstration of account takeover by password resetVideo lesson
This is an Account Takeover Vulnerability I found earlier which is now solved and this is an explained video of finding them out and exploiting them
External Links May Contain Affiliate Links read more