Burp Suite Practitioner Web App Penetration Testing Course
- Description
- Curriculum
- FAQ
- Reviews
Burp Suite Professional Labs – Web Application Penetration Testing & Bug Bounty Hunting
Welcome to the Burp Suite Professional – Web Application Penetration Testing & Bug Bounty Hunting training course.
Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.
This course features all current 145+ Practitioner labs. Martin is solving them all and giving useful insight on how to find and exploit these vulnerabilities. He is not just inserting the payload but explains each step on finding the vulnerability and why it can be exploited in a certain way. The videos are easy to follow along and replicate. Martin is also dropping a lot of tips and tricks for those who wish to get the Burp Suite Certified Practitioner certification (BSCP). This training is highly recommended for anyone who wants to become a professional in Web Application Penetration Testing, Web Application Bug Bounty Hunting or take the Burp Suite Certified Practitioner certification (BSCP) certification.
It will feature all apprentice labs in the following sections:
· SQL injection
· Cross-site scripting
· Cross-site request forgery (CSRF)
· Clickjacking
· DOM-based vulnerabilities
· Cross-origin resource sharing (CORS)
· XML external entity (XXE) injection
· Server-side request forgery (SSRF)
· HTTP request smuggling
· OS command injection
· Server-side template injection
· Directory traversal
· Access control vulnerabilities
· Authentication
· WebSockets
· Web cache poisoning
· Insecure deserialization
· Information disclosure
· Business logic vulnerabilities
· HTTP Host header attacks
· OAuth authentication
· File upload vulnerabilities
· JWT
· Essential skills
· Prototype pollution
Notes & Disclaimer
Portswigger labs are a public and a free service from Portswigger for anyone to use to sharpen their skills. All you need is to sign up for a free account. I will update this course with new labs as they are published. I will to respond to questions in a reasonable time frame. Learning Web Application Pen Testing / Bug Bounty Hunting is a lengthy process, so please don’t feel frustrated if you don’t find a bug right away. Try to use Google, read Hacker One reports and research each feature in-depth. This course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.
-
2SQL injection UNION attack, determining the number of columns returned by the quVideo lesson
-
3SQL injection UNION attack, finding a column containing textVideo lesson
-
4SQL injection UNION attack, retrieving data from other tablesVideo lesson
-
5SQL injection UNION attack, retrieving multiple values in a single columnVideo lesson
-
6SQL injection attack, querying the database type and version on OracleVideo lesson
-
7SQL injection attack, querying the database type and version on MySQL and MSVideo lesson
-
8SQL injection attack, listing the database contents on non-Oracle databasesVideo lesson
-
9SQL injection attack, listing the database contents on OracleVideo lesson
-
10Blind SQL injection with conditional responsesVideo lesson
-
11Blind SQL injection with conditional errorsVideo lesson
-
12Blind SQL injection with time delaysVideo lesson
-
13Blind SQL injection with time delays and information retrievalVideo lesson
-
14Blind SQL injection with out-of-band interactionVideo lesson
-
15Blind SQL injection with out-of-band data exfiltrationVideo lesson
-
16SQL injection with filter bypass via XML encodingVideo lesson
-
17DOM XSS in document.write sink using source location.search inside a select elemVideo lesson
-
18DOM XSS in AngularJS expression with angle brackets and double quotes HTML-enc.Video lesson
-
19Reflected DOM XSSVideo lesson
-
20Stored DOM XSSVideo lesson
-
21Exploiting cross-site scripting to steal cookiesVideo lesson
-
22Exploiting cross-site scripting to capture passwordsVideo lesson
-
23Exploiting XSS to perform CSRFVideo lesson
-
24Reflected XSS into HTML context with most tags and attributes blockedVideo lesson
-
25Reflected XSS into HTML context with all tags blocked except custom onesVideo lesson
-
26Reflected XSS with some SVG markup allowedVideo lesson
-
27Reflected XSS in canonical link tagVideo lesson
-
28Reflected XSS into a JavaScript string with single quote and backslash escapedVideo lesson
-
29Reflected XSS into a JavaScript string with angle brackets and double quotes escVideo lesson
-
30Stored XSS into onclick event with angle brackets and double quotes HTML-encodedVideo lesson
-
31Reflected XSS into a template literal with angle brackets, single, double quotesVideo lesson
-
32CSRF where token validation depends on request methodVideo lesson
-
33CSRF where token validation depends on token being presentVideo lesson
-
34CSRF where token is not tied to user sessionVideo lesson
-
35CSRF where token is tied to non-session cookieVideo lesson
-
36CSRF where token is duplicated in cookieVideo lesson
-
37SameSite Lax bypass via method overrideVideo lesson
-
38SameSite Strict bypass via client-side redirectVideo lesson
-
39SameSite Strict bypass via sibling domainVideo lesson
-
40SameSite Lax bypass via cookie refreshVideo lesson
-
41CSRF where Referer validation depends on header being presentVideo lesson
-
42CSRF with broken Referer validationVideo lesson
-
51Blind XXE with out-of-band interactionVideo lesson
-
52Blind XXE with out-of-band interaction via XML parameter entitiesVideo lesson
-
53Exploiting blind XXE to exfiltrate data using a malicious external DTDVideo lesson
-
54Exploiting blind XXE to retrieve data via error messagesVideo lesson
-
55Exploiting XInclude to retrieve filesVideo lesson
-
56Exploiting XXE via image file uploadVideo lesson
-
60HTTP request smuggling, basic CL.TE vulnerabilityVideo lesson
-
61HTTP request smuggling, basic TE.CL vulnerabilityVideo lesson
-
62HTTP request smuggling, obfuscating the TE headerVideo lesson
-
63HTTP request smuggling, confirming a CL.TE vulnerability via differential resp.Video lesson
-
64HTTP request smuggling, confirming a TE.CL vulnerability via differential responVideo lesson
-
65Exploiting HTTP request smuggling to bypass front-end security controls, CL.TEVideo lesson
-
66Exploiting HTTP request smuggling to bypass front-end security controls, TE.CLVideo lesson
-
67Exploiting HTTP request smuggling to reveal front-end request rewritingVideo lesson
-
68Exploiting HTTP request smuggling to capture other users' requestsVideo lesson
-
69Exploiting HTTP request smuggling to deliver reflected XSSVideo lesson
-
70Response queue poisoning via H2.TE request smugglingVideo lesson
-
75Basic server-side template injectionVideo lesson
-
76Basic server-side template injection (code context)Video lesson
-
77Server-side template injection using documentationVideo lesson
-
78Server-side template injection in an unknown language with a documented exploitVideo lesson
-
79Server-side template injection with information disclosure via user-supplied objVideo lesson
-
80File path traversal, traversal sequences blocked with absolute path bypassVideo lesson
-
81File path traversal, traversal sequences stripped non-recursivelyVideo lesson
-
82File path traversal, traversal sequences stripped with superfluous URL-decodeVideo lesson
-
83File path traversal, validation of start of pathVideo lesson
-
84File path traversal, validation of file extension with null byte bypassVideo lesson

External Links May Contain Affiliate Links read more