The Ultimate Web Application Bug Bounty Hunting Course
- Description
- Curriculum
- FAQ
- Reviews
Welcome to the ultimate Web Application Bug Bounty Hunting course.
Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.
In this course Martin walks students through a step-by-step methodology on how to uncover web vulnerabilities. The theoretical lecture is complimented with the relevant free practical Burp labs to reinforce the knowledge. Martin is not just inserting the payload but explains each step on finding the vulnerability and why it can be exploited in a certain way. The videos are easy to follow along and replicate. This training is highly recommended for anyone who wants to become a professional Web Application Bug Bounty Hunter.
Course outline:
1. Cross-site scripting (XSS) – Theory and Labs
2. Cross-site request forgery (CSRF) – Theory and Labs
3. Open Redirect – Theory and Labs
4. Bypassing Access Control – Theory and Labs
5. Server-side request forgery (SSRF) – Theory and Labs
6. SQL injection – Theory and Labs
7. OS command injection – Theory and Labs
8. Insecure Direct Object References (IDOR) – Theory and Labs
9. XML external entity (XXE) injection – Theory and Labs
10. API Testing – Theory and Labs
11. File upload vulnerabilities – Theory and Labs
12. Java Script analysis – Theory and Labs
13. Cross-origin resource sharing (CORS) – Theory and Labs
14. Business logic vulnerabilities – Theory and Labs
15. Registration flaws
16. Login flaws
17. Password reset flaws
18. Updating account flaws
19. Developer tool flaws
20. Analysis of core application
21. Payment feature flaws
22. Premium feature flaws
23. Directory Traversal – Theory and Labs
24. Methodology to find most bugs
Notes & Disclaimer
Portswigger labs are a public and a free service from Portswigger for anyone to use to sharpen their skills. All you need is to sign up for a free account. I will to respond to questions in a reasonable time frame. Learning Web Application Pen Testing / Bug Bounty Hunting is a lengthy process, so please don’t feel frustrated if you don’t find a bug right away. Try to use Google, read Hacker One reports and research each feature in-depth. This course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.
-
2XSS MethodologyVideo lesson
-
3XSS Links and SlidesText lesson
-
4Reflected XSS into HTML context with nothing encodedVideo lesson
-
5Stored XSS into HTML context with nothing encodedVideo lesson
-
6DOM XSS in document.write sink using source location.searchVideo lesson
-
7DOM XSS in innerHTML sink using source location.searchVideo lesson
-
8DOM XSS in jQuery anchor href attribute sink using location.search sourceVideo lesson
-
9DOM XSS in jQuery selector sink using a hashchange eventVideo lesson
-
10Reflected XSS into attribute with angle brackets HTML-encodedVideo lesson
-
11Stored XSS into anchor href attribute with double quotes HTML-encodedVideo lesson
-
12Reflected XSS into a JavaScript string with angle brackets HTML encodedVideo lesson
-
13DOM XSS in document.write sink using source location.search inside a select elemVideo lesson
-
14DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encodVideo lesson
-
15Reflected DOM XSSVideo lesson
-
16Stored DOM XSSVideo lesson
-
17Exploiting cross-site scripting to steal cookiesVideo lesson
-
18Exploiting cross-site scripting to capture passwordsVideo lesson
-
19Exploiting XSS to perform CSRFVideo lesson
-
20Reflected XSS into HTML context with most tags and attributes blockedVideo lesson
-
21Reflected XSS into HTML context with all tags blocked except custom onesVideo lesson
-
22Reflected XSS with some SVG markup allowedVideo lesson
-
23Reflected XSS in canonical link tagVideo lesson
-
24Reflected XSS into a JavaScript string with single quote and backslash escapedVideo lesson
-
25Reflected XSS into a JavaScript string with angle brackets and double quotes HTMVideo lesson
-
26Stored XSS into onclick event with angle brackets and double quotes HTML-encodedVideo lesson
-
27Reflected XSS into a template literal with angle brackets, single, double quotesVideo lesson
-
28CSRF MethodologyVideo lesson
-
29CSRF Links and SlidesText lesson
-
30CSRF vulnerability with no defensesVideo lesson
-
31CSRF where token validation depends on request methodVideo lesson
-
32CSRF where token validation depends on token being presentVideo lesson
-
33CSRF where token is not tied to user sessionVideo lesson
-
34CSRF where token is tied to non-session cookieVideo lesson
-
35CSRF where token is duplicated in cookieVideo lesson
-
36SameSite Lax bypass via method overrideVideo lesson
-
37SameSite Strict bypass via client-side redirectVideo lesson
-
38SameSite Strict bypass via sibling domainVideo lesson
-
39SameSite Lax bypass via cookie refreshVideo lesson
-
40CSRF where Referer validation depends on header being presentVideo lesson
-
41CSRF with broken Referer validationVideo lesson
-
48Bypassing Access Control MethodologyVideo lesson
-
49Bypassing Access Control Links and SlidesText lesson
-
50Unprotected admin functionalityVideo lesson
-
51Unprotected admin functionality with unpredictable URLVideo lesson
-
52User role controlled by request parameterVideo lesson
-
53User role can be modified in user profileVideo lesson
-
54User ID controlled by request parameterVideo lesson
-
55User ID controlled by request parameter, with unpredictable user IDsVideo lesson
-
56User ID controlled by request parameter with data leakage in redirectVideo lesson
-
57User ID controlled by request parameter with password disclosureVideo lesson
-
58URL-based access control can be circumventedVideo lesson
-
59Method-based access control can be circumventedVideo lesson
-
60Multi-step process with no access control on one stepVideo lesson
-
61Referer-based access controlVideo lesson
-
62Server-side request forgery (SSRF) MethodologyVideo lesson
-
63Server-side request forgery (SSRF) Links and SlidesText lesson
-
64Basic SSRF against the local serverVideo lesson
-
65Basic SSRF against another back-end systemVideo lesson
-
66SSRF with blacklist-based input filterVideo lesson
-
67SSRF with filter bypass via open redirection vulnerabilityVideo lesson
-
68Blind SSRF with out-of-band detectionVideo lesson
-
69SQL injection MethodologyVideo lesson
-
70SQL injection Links and SlidesText lesson
-
71SQL injection vulnerability in WHERE clause allowing retrieval of hidden dataVideo lesson
-
72SQL injection vulnerability allowing login bypassVideo lesson
-
73SQL injection UNION attack, determining the number of columns returnedVideo lesson
-
74SQL injection UNION attack, finding a column containing textVideo lesson
-
75SQL injection UNION attack, retrieving data from other tablesVideo lesson
-
76SQL injection UNION attack, retrieving multiple values in a single columnVideo lesson
-
77SQL injection attack, querying the database type and version on OracleVideo lesson
-
78SQL injection attack, querying the database type and version on MySQL and MSVideo lesson
-
79SQL injection attack, listing the database contents on non-Oracle databasesVideo lesson
-
80SQL injection attack, listing the database contents on OracleVideo lesson
-
81Blind SQL injection with conditional responsesVideo lesson
-
82Blind SQL injection with conditional errorsVideo lesson
-
83Blind SQL injection with time delaysVideo lesson
-
84Blind SQL injection with time delays and information retrievalVideo lesson
-
85Blind SQL injection with out-of-band interactionVideo lesson
-
86Blind SQL injection with out-of-band data exfiltrationVideo lesson
-
87SQL injection with filter bypass via XML encodingVideo lesson
External Links May Contain Affiliate Links read more