Companies Home Search Profile

Keep Hacking at HackerOne

Focused View

Dawid Czagan

54:44

119 View
  • Introduction.mp4
    07:36
  • How to Impersonate a User via Insecure Log In - Demo.mp4
    04:55
  • How to Impersonate a User via Insecure Log In - Overview.mp4
    03:54
  • Sensitive Information in Metadata - Demo.mp4
    05:46
  • Sensitive Information in Metadata - Overview.mp4
    03:00
  • Disclosure of Credentials - Demo.mp4
    05:45
  • Disclosure of Credentials - Overview.mp4
    04:38
  • zz - Windows - Office + ADOBE-Visual Studi0.txt
  • Insecure Password Change - Demo.mp4
    03:33
  • Insecure Password Change - Overview.mp4
    03:22
  • Dictionary Attack - Demo.mp4
    03:23
  • Dictionary Attack - Overview.mp4
    04:49
  • Summary.mp4
    04:03
  • Description


    Learn About The Next 5 Bugs That Really Work

    What You'll Learn?


    • Explore the next 5 bugs that really work
    • Discover how to find these bugs step-by-step in practice (DEMOS)
    • Get paid for your findings
    • Become a successful bug hunter
    • Learn from one of the top hackers at HackerOne

    Who is this for?


  • Penetration testers, ethical hackers, bug hunters, security engineers / consultants
  • More details


    Description

    This course is the follow-up to one of my previous courses – Start Hacking at HackerOne. We will continue our bug hunting journey and you will learn about the next 5 bugs that have been successful for me for years!

    HackerOne is a big opportunity for you. At HackerOne you can legally hack some of the biggest companies (Twitter, Uber, Yahoo, Coinbase, Slack, etc.), and you can get paid for your findings. You can earn for example $100, $1,000 or $10,000 per one bug. It’s just amazing. All you need are Internet connection and knowledge.

    Yes, you need knowledge and this is exactly what I’m going to give you in this course. I’m one of the top hackers at HackerOne (among more than 100,000 registered hackers), and I really know how to make money out there. If you want to keep hacking and making money at HackerOne, then this course is just for you.

    You will learn about the next 5 bugs that I recommend you to play with (these bugs have been successful for me for years). Here are these bugs:

    1. How to Impersonate a User via Insecure Log In
    2. Sensitive Information in Metadata
    3. Disclosure of Credentials
    4. Insecure Password Change
    5. Dictionary Attack

    For every single bug there is a DEMO so that you can see how to find these bugs step-by-step in practice.

    Do you want to make money in bug bounty programs? Let’s enroll to this course and continue our exciting journey.

    -------------------------------------------------------------------------------------------------------------------------------------------------------------------------

    Course Rating: ★★★★★

    "Great course! Clear explanation and awesome demos. Thank you."

    - Adel Boutine, Independent Security Researcher


    Course Rating: ★★★★★

    "keep this great job up"

    - Jan, Student


    Course Rating: ★★★★★

    "Clear articulation of security bugs."

    - Cecil Su, Director

    -------------------------------------------------------------------------------------------------------------------------------------------------------------------------

    Who this course is for:

    • Penetration testers, ethical hackers, bug hunters, security engineers / consultants

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Dawid Czagan
    Dawid Czagan
    Instructor's Courses
    Dawid Czagan is listed among Top 10 Hackers (HackerOne). He has found security vulnerabilities in Google, Yahoo, Mozilla, Microsoft, Twitter and other companies. Due to the severity of many bugs, he received numerous awards for his findings.Dawid Czagan shares his security bug hunting experience in his hands-on trainings “Hacking Web Applications – Case Studies of Award-Winning Bugs in Google, Yahoo, Mozilla and More” and “Bug Hunting Millionaire: Mastering Web Attacks with Full-Stack Exploitation”. He delivered security training courses at key industry conferences such as Hack In The Box (Amsterdam), CanSecWest (Vancouver), 44CON (London), Hack In Paris (Paris), DeepSec (Vienna), HITB GSEC (Singapore), BruCON (Ghent) and for many corporate clients. His students include security specialists from Oracle, Adobe, ESET, ING, Red Hat, Trend Micro, Philips and government sector.Dawid Czagan is a founder and CEO at Silesia Security Lab – a company which delivers specialized security testing and training services. To find out about the latest in Dawid Czagan’s work, you are invited to follow him on Twitter.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 12
    • duration 54:44
    • Release Date 2023/05/14