Companies Home Search Profile

Offensive Bug Bounty - Hunter 2.0

Focused View

Vikash Chaudhary

36:05:11

397 View
  • 1. About Hunter 2.0.mp4
    03:26
  • 2. About Author.mp4
    02:39
  • 3. What you should know before taking this course.mp4
    01:01
  • 1. Subdomains of domain.mp4
    04:34
  • 2. Find Subdomains of Subdomains.mp4
    06:07
  • 3. Filter All the Live subdomains for Hunting.mp4
    02:05
  • 4. All subdomains https status code.mp4
    04:22
  • 1. GET - Error based - strip comments_.mp4
    06:36
  • 2. POST- Second Oder Injections Real treat ....mp4
    03:13
  • 3. GET - Error based - All your OR & AND be ....mp4
    02:46
  • 4. GET - Blind Based - All your OR & AND be ....mp4
    04:09
  • 5. GET - Error based - All your SPACES and ....mp4
    04:43
  • 6. GET - Blind Based - All your SPACES and ....mp4
    04:31
  • 7. GET - Error Based- All your UNION & SELE ....mp4
    03:30
  • 8. GET - Blind Based- All your UNION & SELE ....mp4
    03:52
  • 9. GET - Error Based- All your UNION & SELE ....mp4
    02:39
  • 10. GET - Blind Based- All your UNION & SELE ....mp4
    01:07
  • 11. GET -Error based- IMPIDENCE MISMATCH- Ha ....mp4
    01:31
  • 12. GET - BLIND - IMPIDENCE MISMATCH- Having ....mp4
    01:12
  • 13. GET - BLIND - IMPIDENCE MISMATCH- Having ....mp4
    03:58
  • 14. GET - Bypass custom filter adding slashe ....mp4
    00:54
  • 15. GET - Bypass AddSlashes().mp4
    03:09
  • 16. POST - Bypass AddSlashes().mp4
    01:45
  • 17. POST - Bypass Add Slashes (we dont need ....mp4
    02:20
  • 18. GET -Bypass MySQL Real Escape String.mp4
    02:06
  • 19. POST - Bypass MySQL Real Escape String.mp4
    05:25
  • 20. GET- Stacked Query Injection - String.mp4
    07:37
  • 21. GET - Stacked Query Injection - Intiger ....mp4
    09:31
  • 22. GET - BLIND based - String - Stacked.mp4
    02:22
  • 23. GET - BLIND based - Intiger - Stacked.mp4
    02:54
  • 24. POST - Error based - String - Stacked.mp4
    03:21
  • 25. POST - Error based - String - Stacked -B ....mp4
    03:22
  • 26. POST - Error based - String - Stacked - ....mp4
    02:14
  • 27. GET - Error based - Numeric - ORDER BY C ....mp4
    07:35
  • 28. GET - Error based - String - ORDER BY CL ....mp4
    05:38
  • 29. GET - Error based - Blind- Numeric- ORDE ....mp4
    03:12
  • 30. GET - Error based - String- Blind - ORDE ....mp4
    02:56
  • 31. GET - Error based - ORDER BY CLAUSE -num ....mp4
    03:09
  • 32. GET - Error based - ORDER BY CLAUSE-Stri ....mp4
    03:57
  • 33. GET - Blind based - ORDER BY CLAUSE -num ....mp4
    01:42
  • 34. GET - GET - Blind based - ORDER BY CLAUS ....mp4
    01:28
  • 35. GET - challenge - Union- 10 queries allo ....mp4
    10:05
  • 36. GET - challenge - Union- 14 queries allo ....mp4
    05:24
  • 37. GET - challenge - Union- 14 queries allo ....mp4
    04:21
  • 38. GET - challenge - Union- 14 queries allo ....mp4
    03:14
  • 39. GET - challenge - Double Query- 5 querie ....mp4
    05:47
  • 40. GET - challenge - Double Query- 5 querie ....mp4
    02:22
  • 41. GET - challenge - Double Query- 5 querie ....mp4
    01:48
  • 42. GET - challenge - Double Query- 5 querie ....mp4
    01:36
  • 43. GET - challenge - Blind - 130 queries al ....mp4
    06:22
  • 44. GET - challenge - Blind - 130 queries al ....mp4
    00:33
  • 1. Background Concept.mp4
    02:55
  • 2. No Rate Limiting Live Hunting 1.mp4
    04:51
  • 3. No Rate Limiting Live Hunting 2.mp4
    01:58
  • 4. No Rate Limiting Live Hunting 3.mp4
    05:38
  • 5. Reporting.mp4
    02:05
  • 1. Background Concept.mp4
    03:44
  • 2. Long Password Dos Attack Hunting 1.mp4
    03:26
  • 3. Long Password Dos Attack Hunting 2.mp4
    08:59
  • 4. Long Password Dos Attack Hunting 3.mp4
    02:45
  • 5. Reporting.mp4
    01:17
  • 1. Background Concept.mp4
    04:47
  • 2. Types of Buffer Overflow.mp4
    10:52
  • 3. Buffer Overflow Live Hunting.mp4
    02:52
  • 4. Buffer Overflow on browser.mp4
    01:04
  • 1. Background Concept.mp4
    02:10
  • 2. Intercepting mobile app traffic in burpsuite.mp4
    06:40
  • 3. Bypassing Android ssl pinning.mp4
    09:19
  • 4. Android App Live Hunting part 1.mp4
    17:34
  • 5. Android App Live Hunting part 2.mp4
    06:09
  • 6. Android App Live Hunting 2.mp4
    16:17
  • 7. Android App Live Hunting 3.mp4
    07:26
  • 8. Accont takeover through response interception.mp4
    05:11
  • 9. No rate limiting in android app.mp4
    03:23
  • 1. Background Concept.mp4
    14:28
  • 2. Hostile Subdomain Takeover Live Hunting 1.mp4
    04:34
  • 3. Hostile Subdomain Takeover Live Hunting 2.mp4
    03:32
  • 4. AWS S3 Bucket Takeover part 1.mp4
    11:08
  • 5. AWS S3 Bucket Takeover part 2.mp4
    02:34
  • 6. Hostile Subdomain Takeover Live Hunting 4.mp4
    04:20
  • 7. Hostile Subdomain Takeover Live Hunting 5.mp4
    04:01
  • 8. Hostile Subdomain Takeover Live Hunting 6.mp4
    03:50
  • 1. Background Concept.mp4
    05:16
  • 2. Idor Live Hunting 1.mp4
    03:32
  • 3. Idor Live Hunting 2.mp4
    05:37
  • 4. Idor Live Hunting 3.mp4
    10:01
  • 5. Idor Live Hunting 4.mp4
    05:25
  • 6. Account Takeover Idor.mp4
    07:30
  • 1. Background Concept.mp4
    02:02
  • 2. WPSCAN Overview.mp4
    08:09
  • 3. Hunting lab part 1.mp4
    06:53
  • 4. XML RPC ping Back.mp4
    06:30
  • 5. Blind RCE.mp4
    05:28
  • 6. CMS Map Overview.mp4
    17:16
  • 7. Hunting lab part 2.mp4
    09:27
  • 8. Live hunting 1.mp4
    16:34
  • 9. Live hunting 2.mp4
    23:31
  • 1. Overview of joomla.mp4
    08:01
  • 2. Live hunting 1.mp4
    07:49
  • 3. Live hunting 2.mp4
    03:33
  • 4. Live hunting 3.mp4
    09:44
  • 5. Live hunting 4.mp4
    09:46
  • 6. Live hunting 5.mp4
    03:21
  • 1. Background Concept.mp4
    03:25
  • 2. Drupal Vulnerability Hunting.mp4
    04:00
  • 3. Metasploit for Drupal.mp4
    14:12
  • 4. Live Hunting 1 RCE.mp4
    01:59
  • 5. Live Hunting 2 RCE and Others.mp4
    02:41
  • 6. Live Hunting Part 3.mp4
    04:09
  • 1. Overview of All Types of CMS.mp4
    01:50
  • 2. Background Concept about All types of CMS Vulnerabilities.mp4
    04:08
  • 3. Automated CMS Vulnerability Scanners.mp4
    05:23
  • 4. Automated CMS Vulnerability Scanners.mp4
    05:01
  • 1. Background Concept.mp4
    04:55
  • 2. Csrf Live Hunting 1.mp4
    06:50
  • 3. Csrf Live Hunting 2.mp4
    05:04
  • 4. Csrf Live Hunting 3.mp4
    03:51
  • 5. Csrf Live Hunting 4.mp4
    06:43
  • 6. Csrf Account Takeover.mp4
    06:54
  • 7. Reporting.mp4
    07:49
  • 1. Background Concept.mp4
    06:35
  • 2. Hsts Live Hunting 1.mp4
    04:50
  • 3. Hsts Live Hunting 2.mp4
    04:59
  • 4. Reporting.mp4
    01:08
  • 1. Background Concept.mp4
    05:11
  • 2. Session Fixation Live Hunting 1.mp4
    06:23
  • 3. Session Fixation Live Hunting 2.mp4
    03:47
  • 4. Session Fixation Live Hunting 3.mp4
    04:59
  • 1. Background Concept.mp4
    03:57
  • 2. Account Lockout Hunting 1.mp4
    03:41
  • 3. Account Lockout Hunting 2.mp4
    02:39
  • 4. Account Lockout Hunting 3.mp4
    02:10
  • 5. Reporting.mp4
    03:13
  • 1. SSRF Concept.mp4
    11:14
  • 2. Basic SSRF concept.mp4
    06:23
  • 3. SSRF to XSS.mp4
    07:15
  • 4. SSRF to read internal file.mp4
    01:12
  • 5. SSRF in FFMPEG.mp4
    04:44
  • 6. SSRF AWS cloud retrieve metadata.mp4
    06:56
  • 7. SSRF through html.mp4
    04:56
  • 1. Background Concept.mp4
    04:21
  • 2. Introduction to MobsF.mp4
    05:21
  • 3. Static Analysis with MobSf.mp4
    15:31
  • 4. Live Static Analysis.mp4
    09:47
  • 5. Static Analysis with Visual code Grepper.mp4
    04:45
  • 6. Live Static Analysis.mp4
    05:09
  • 7. All About AndroBug Framework.mp4
    04:49
  • 8. Hunting With Qark.mp4
    04:56
  • 9. Mobile App Static Analysis.mp4
    01:21
  • 1. All about Password Reset Poisoning.mp4
    06:42
  • 2. Live Hunting 1.mp4
    04:03
  • 3. Live Hunting 2.mp4
    03:40
  • 4. Live Hunting 3.mp4
    05:52
  • 1. Frida & Objection.mp4
    03:09
  • 2. Installation and Setting Up Frida & Objection.mp4
    10:14
  • 3. SSL Pinning Bypass with Frida.mp4
    14:04
  • 4. SSL Pinning Bypass with objection.mp4
    15:23
  • 5. Android Anti Root Bypass with Frida & Objection.mp4
    06:59
  • 6. Frida & Objection Conclusion.mp4
    04:05
  • 7. Introduction to AppMon.mp4
    11:32
  • 8. Android APP Tracer.mp4
    02:39
  • 9. Intruding in Android APP.mp4
    04:51
  • 10. All About Drozer.mp4
    02:50
  • 11. Hunting with Drozer.mp4
    06:59
  • 1. Background Concept.mp4
    03:44
  • 2. Attack Points.mp4
    05:05
  • 3. Blind xss on Practice Web.mp4
    03:53
  • 4. Blind xss Live Hunting 1.mp4
    07:28
  • 5. Blind xss Live Hunting 2.mp4
    06:13
  • 6. Multiple Blind xss Payloads Execution 1.mp4
    09:17
  • 7. Multiple Blind xss Payloads Execution 2.mp4
    11:51
  • 8. Blind xss Live Hunting 3.mp4
    04:48
  • 9. Blind xss on DELL.mp4
    04:37
  • 1. Identity Management Testing.mp4
    02:38
  • 2. Test Role Definitions 1.mp4
    05:22
  • 3. Test Role Definitions 2.mp4
    03:16
  • 4. Test User Registration Process.mp4
    08:53
  • 5. Test Account Provisioning.mp4
    11:48
  • 6. Testing for account enumeration and guessable user account.mp4
    03:07
  • 7. Test for weak or unenforced username policy.mp4
    02:26
  • 1. Background Concept.mp4
    05:36
  • 2. Facebook Live Hunting.mp4
    05:12
  • 3. Live Bug Bounty Hunting on Google and others.mp4
    02:27
  • 4. Flickr & Pinterest Live Hunting.mp4
    08:06
  • 5. POC 1.mp4
    00:56
  • 6. POC 2.mp4
    01:31
  • 7. Conclusion.mp4
    00:43
  • 1. Introduction.mp4
    02:51
  • 2. Testing for default credentials.mp4
    22:42
  • 3. Testing for default content.mp4
    02:10
  • 4. Dangerous http methods.mp4
    05:35
  • 5. Ways to detect http methods.mp4
    06:45
  • 6. Exploitation of dangerous methods.mp4
    07:43
  • 7. Application Server as proxy.mp4
    07:02
  • 8. Web server software bugs.mp4
    17:30
  • 9. Web server software bugs 2.mp4
    26:33
  • 10. Web server software bugs 3.mp4
    02:52
  • 1. Cryptography related issues.mp4
    01:53
  • 2. Common Bugs in TLSSSL.mp4
    03:25
  • 3. Testing for weak ssltls ciphersprotocolkeys vulnerabilities.mp4
    09:53
  • 4. Checking for client renegotiation Manual Hunting.mp4
    04:43
  • 5. Testing ssltls Vulnerabilities.mp4
    04:10
  • 6. Testing ssltls Vulnerabilities part2.mp4
    06:02
  • 7. Breach Compression Attack.mp4
    02:26
  • 8. Poodle attack SSLV3 Live Hunting.mp4
    08:50
  • 9. Poodle attack SSLV3 Live Hunting 2.mp4
    05:46
  • 10. Why U should Hunt for Poodle Attack.mp4
    01:18
  • 1. Session Management Issues.mp4
    01:56
  • 2. Bypassing Session Management Schema.mp4
    16:52
  • 3. Testing for Cookies Attributes.mp4
    08:49
  • 4. Cookies Attributes Live.mp4
    01:27
  • 5. Testing for Exposed Session Variables.mp4
    04:55
  • 6. Testing for Logout Functionality.mp4
    06:39
  • 7. Testing for Session Timeout.mp4
    02:17
  • 8. Session Mgmt Vuln on Password Reset or on other inj point.mp4
    10:32
  • 1. Background Concept Must watch.mp4
    03:16
  • 2. Find Source Code Control system using Burpsuite.mp4
    08:21
  • 3. Find Source Code Control system using dirb.mp4
    04:59
  • 4. Git Repository Dumper.mp4
    07:09
  • 5. Other Types of Source Code Control System Dump.mp4
    05:39
  • 6. Why Hunt and Extract Metadata of Repository.mp4
    02:04
  • 1. Apache Struts Vulnerability Details.mp4
    04:34
  • 2. Identify Apache Struts2 RCE Vuln.mp4
    12:56
  • 3. Exploit Apache Struts 2 RCE through Content Type.mp4
    05:07
  • 4. Exploit Apache Struts 2 RCE Live website 2.mp4
    03:10
  • 1. Comprehensive Command Injection.mp4
    09:04
  • 2. Steps to setup lab.mp4
    01:25
  • 3. Classic regular example.mp4
    05:06
  • 4. Classic (Base64) regular example.mp4
    05:21
  • 5. Classic (Hex) regular example.mp4
    03:52
  • 6. Classic single-quote example.mp4
    04:24
  • 7. Classic double-quote example.mp4
    03:46
  • 8. Classic blacklisting example.mp4
    02:19
  • 9. Classic hashing example.mp4
    04:27
  • 10. Classic example & Basic HTTP Authentication.mp4
    02:10
  • 11. Blind regular example.mp4
    08:55
  • 12. Double Blind regular example.mp4
    04:13
  • 13. Eval regular example.mp4
    07:08
  • 14. Eval (Base64) regular example.mp4
    02:56
  • 15. Classic (JSON) regular example.mp4
    07:48
  • 16. Eval (JSON) regular example.mp4
    02:27
  • 17. Preg_match() regular & blind example.mp4
    14:01
  • 18. Str_replace() regular example.mp4
    02:59
  • 19. Create_function() regular example.mp4
    03:46
  • 20. Regex for domain name validation.mp4
    03:08
  • 21. Nested quotes.mp4
    05:13
  • 1. Background Concept.mp4
    05:49
  • 2. Exploitation Way.mp4
    04:20
  • 3. Live Demo 1.mp4
    07:40
  • 4. Live Demo 2.mp4
    04:12
  • 5. Live Demo 3.mp4
    17:28
  • 1. Background Concept.mp4
    09:01
  • 2. More about SSI injection.mp4
    07:08
  • 3. Live SSI injection.mp4
    07:45
  • 4. Live SSI injection.mp4
    11:32
  • 5. Live SSI injection.mp4
    03:57
  • 1. The HelpDesk let the Hacker in.mp4
    05:55
  • 2. Live Hunting Ticket Trick.mp4
    08:33
  • 3. Impact of Ticket Trick Hack.mp4
    01:32
  • 1. Evil Takeover Concept.mp4
    05:56
  • 2. Steps for Evil way Takeover.mp4
    02:45
  • 3. Live Demonstration of Evil Takeover.mp4
    03:16
  • 4. Successfully Evil Takeover.mp4
    04:56
  • 1. Background Concept.mp4
    03:02
  • 2. Live demonstration.mp4
    02:53
  • 3. Live Demonstration Part 2.mp4
    02:26
  • 1. HTTPOXY Attack.mp4
    04:28
  • 2. Hunting for HTT POXY Attack.mp4
    04:35
  • 3. Second way to hunt HTT POXY Attack.mp4
    04:04
  • 4. Live hunting of HTTPOXY Vulnerability.mp4
    02:06
  • 5. Live hunting using tool.mp4
    04:22
  • 1. Background Concepts.mp4
    03:34
  • 2. Shellshock bash RCE live demo.mp4
    01:57
  • 3. Live hunting Shellshock RCE.mp4
    06:27
  • 4. Live hunting for shellshock RCE 2.mp4
    01:14
  • 1. Background Concept.mp4
    03:24
  • 2. Hunting apache range dos.mp4
    03:49
  • 3. Exploitation of apache range dos.mp4
    01:25
  • 1. Background Concept.mp4
    03:02
  • 2. Webmin unauthenticated RCE.mp4
    05:18
  • 1. Background Concept.mp4
    02:52
  • 2. Live demo authentication bypass.mp4
    02:29
  • 3. Hunting for appweb authentication bypass.mp4
    03:26
  • 1. Nginx Rate Filtering shaping overflow.mp4
    04:11
  • 2. Hunting For Nginx Rate Filtering shaping overflow.mp4
    04:42
  • 1. Background Concepts.mp4
    02:18
  • 2. File read Vulnerability.mp4
    11:59
  • 1. Docker API Unauthorized RCE.mp4
    05:10
  • 2. Enum For Docker API Services.mp4
    03:38
  • 3. Docker API Unauthorized RCE On lab.mp4
    03:06
  • 4. Docker API Unauthorized RCE Live.mp4
    05:46
  • 1. Postgresql Authenticated RCE.mp4
    02:14
  • 2. Postgres RCE On Lab.mp4
    05:01
  • 3. Live Hunting Postgres RCE.mp4
    06:37
  • 1. Apache Spark RCE.mp4
    03:31
  • 2. Hunting Apache Spark RCE Part 1.mp4
    05:23
  • 3. Hunting Apache Spark RCE Part 2.mp4
    03:07
  • 1. PHPMyadmin Authenticated RCE.mp4
    02:56
  • 2. Hunting RCE For Authenticated PHPMyadmin.mp4
    04:17
  • 3. PHPMyadmin Authenticated RFI.mp4
    02:13
  • 4. PHPMyadmin Authenticated LFI To RCE.mp4
    02:34
  • 1. Mysql Authentication Bypass Vulnerability.mp4
    03:33
  • 2. Hunting For MySQL Authentication bypassing.mp4
    03:14
  • 3. Live Hunting For Mysql Auth bypass.mp4
    02:29
  • 1. DNS Zone transfer vulnerability.mp4
    05:25
  • 2. Live attack dns zone transfer.mp4
    03:30
  • 1. Flask (Jinja2) Server side template injection.mp4
    07:19
  • 2. Exploitation of template injection.mp4
    01:47
  • 1. Hunting Hadoop Vulnerability.mp4
    08:50
  • 2. Nmap for Hadoop Vulnerability.mp4
    02:02
  • 3. Hunting for Hadoop.mp4
    08:24
  • 4. Browsing the HDFS Data Leak.mp4
    05:46
  • 5. Hadoop RCE.mp4
    02:23
  • 6. Live Hadoop Hunting.mp4
    04:15
  • 1. GIT Shell Bypass.mp4
    03:43
  • 2. Git Shell bypass Hunting.mp4
    04:58
  • 3. Git Shell Command Execution.mp4
    01:15
  • 1. Redis Unauthorised Access Vulnerability.mp4
    02:37
  • 2. Hunting For Unauthorised Access.mp4
    02:09
  • 3. Live Hunting.mp4
    01:21
  • 4. Redis RCE.mp4
    02:02
  • 1. Attack Scrapyd Crawler.mp4
    06:10
  • 2. Exploting Scrapyd.mp4
    06:10
  • 3. Live Hunting Scrapyd.mp4
    04:10
  • 1. Lab Setup In Windows.mp4
    02:57
  • 2. Setting Up Labs.mp4
    01:44
  • 3. Upload Image by Blocking JavaScript.mp4
    02:33
  • 4. Content-Type Bypass.mp4
    03:50
  • 5. Suffix Blacklist Bypass.mp4
    04:09
  • 6. File Parsing Rules Bypass.mp4
    04:08
  • 7. Not Unified Case Of Suffix.mp4
    02:08
  • 8. Blacklist Bypassing Windows Feature.mp4
    06:27
  • 9. Blackist Bypassing Windows Feature More Lession 7.mp4
    03:26
  • 10. Blackist Bypassing Windows Feature More Lession 8.mp4
    03:20
  • 11. Blackist Bypassing Windows Feature More Lession 9.mp4
    05:11
  • 12. Double Write Bypass Method.mp4
    02:24
  • 13. Picture Prefix Bypass.mp4
    10:46
  • 14. GetImageSize Functionality Bypass.mp4
    02:53
  • 15. Php-Exif Module Bypass.mp4
    02:58
  • 16. Comprehensive Picture Horse Example.mp4
    01:44
  • 17. Conditional Race 1.mp4
    06:09
  • 18. Conditional Race 2.mp4
    02:37
  • 19. Nullbyte.mp4
    01:44
  • 1. CSRF Same Site Bypass.mp4
    10:46
  • 2. CSRF Same Site Bypass lab.mp4
    05:17
  • 1. Session Puzzling.mp4
    04:54
  • 2. Session Puzzling Lab.mp4
    03:53
  • 3. Live Session Puzzling Test Cases.mp4
    05:08
  • 1. JWT.mp4
    03:40
  • 2. Issues Of JWT tokens.mp4
    11:34
  • 3. JWT None Algorithm.mp4
    05:09
  • 4. JWT Weak Secret used as a Key.mp4
    04:45
  • 5. JWT Signature RS256 To HS256.mp4
    05:52
  • 1. Email Bounce Issues.mp4
    12:03
  • 2. Email Bounce Live.mp4
    13:28
  • 3. Email Bounce Exploit Impact.mp4
    06:15
  • 1. IVR Call Request Crash.mp4
    01:44
  • 2. Live IVR Call Crash.mp4
    04:14
  • 1. Obscure Email.mp4
    05:03
  • 2. Live Hunting Obscure Email Vulnerability.mp4
    11:09
  • 1. Background Concept.mp4
    05:02
  • 2. AWS Attack Vector.mp4
    06:06
  • 3. Attacker Motivation.mp4
    01:57
  • 4. Bucket Listing Access Permission Set to Everyone.mp4
    11:03
  • 5. Bucket Listing Any AWS Authenticated User.mp4
    10:05
  • 6. Leaking AWS Keys by commiting GIT REPO.mp4
    21:28
  • 7. EC2 Snapshot Accesible to ALL AWS USER.mp4
    15:05
  • 8. Exposed Proxy Access to Instance Metadata.mp4
    11:04
  • 9. Excessive Permission are Given.mp4
    21:29
  • 10. Privilege Escalation by Rollback.mp4
    21:04
  • 11. Privilege Escalation Automation.mp4
    07:39
  • 12. AWS Cloud Breach.mp4
    16:20
  • 13. AWS EC2 SSRF.mp4
    23:04
  • 14. CODEBUILD Secrets.mp4
    16:38
  • 15. RCE WEB APP.mp4
    18:06
  • 16. RCE WEB APP Part 2.mp4
    20:32
  • 17. Input Validation Vulnerability.mp4
    10:01
  • 18. Open Container Images.mp4
    10:24
  • 19. SSRF to Private IP Instance MetaData.mp4
    11:21
  • Description


    A Dynamic Hands-on Course on Bug Bounty Hunting

    What You'll Learn?


    • Bug Bounty hunting
    • Android App Penetration Testing
    • Web Application Penetration Testing
    • Application Security Testing

    Who is this for?


  • Student
  • Developers
  • Information Security Researcher
  • Bug Bounty Hunter
  • Cybersecurity Researcher
  • Cybersecurity Engineers
  • What You Need to Know?


  • Watch Offensive Approach to Hunt Bugs Course First
  • More details


    Description

    "Offensive Bug Bounty – Hunter 2.0" is an advanced course designed for those who have completed the foundational "Offensive Approach to Hunt Bugs." This sequel expands upon the initial training, diving deep into the complexities of identifying critical vulnerabilities in both web and mobile applications. As participants transition from the first course to this more specialized one, they are positioned to refine their techniques and emerge as adept stealth bug bounty hunters.

    Bug bounty hunting involves the identification of security vulnerabilities in websites and applications and responsibly disclosing these findings to the respective company's security team. This practice is known as ethical hacking because it helps organizations enhance their security measures before malicious attackers can exploit the vulnerabilities. Bug bounty programs, often referred to as responsible disclosure programs, are initiatives set up by companies to encourage individuals to report potential security issues. By participating in these programs, researchers can receive rewards such as monetary bounties, swag, or recognition in the company's hall-of-fame.

    For those with a keen interest in web application security, engaging in bug bounty hunting not only sharpens your skills but also offers the opportunity to gain recognition and earn rewards. This pursuit combines the thrill of discovery with the satisfaction of contributing to the enhancement of internet safety, making it a compelling and potentially lucrative endeavor for skilled cybersecurity enthusiasts.

    Who this course is for:

    • Student
    • Developers
    • Information Security Researcher
    • Bug Bounty Hunter
    • Cybersecurity Researcher
    • Cybersecurity Engineers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Vikash Chaudhary
    Vikash Chaudhary
    Instructor's Courses
    Passionate about creating a secure digital world, I embarked on a journey to tackle the emerging challenges of automotive cybersecurity. As the Founder and CEO of HackersEra, I lead a team of talented individuals dedicated to safeguarding connected vehicles and shaping the future of cybersecurity.My path to success wasn't paved with privilege. Growing up in a rural background, I had limited exposure to technology. However, fueled by an insatiable curiosity and a burning desire to make a difference, I embarked on a self-taught journey to master the intricacies of cybersecurity. I turned challenges into stepping stones, transforming my limitations into opportunities for growth.Through relentless dedication and unwavering belief, I built HackersEra from the ground up. What started as a one-person venture has now become India's first vehicle pentest company, at the forefront of securing connected vehicles. We provide cutting-edge solutions that protect individuals and organizations from evolving cyber threats.As a TEDx speaker, I have had the privilege of sharing my story of belief and dedication, inspiring audiences to pursue their dreams despite adversities. I firmly believe that passion and hard work can break down barriers and propel us towards unimaginable heights.Innovation and collaboration are central to my approach. I collaborate with industry experts, researchers, and thought leaders to stay ahead of the ever-evolving cybersecurity landscape. By fostering partnerships and pushing boundaries, we are driving transformative change in the field.My mission extends beyond HackersEra. I am dedicated to raising awareness about the importance of cybersecurity, empowering individuals and organizations to protect themselves in the digital age. Through speaking engagements, workshops, and mentorship programs, I aim to inspire the next generation of cybersecurity professionals.Join me on this exciting journey of innovation and transformation. Let's connect and collaborate to create a secure digital future. Together, we can make a lasting impact and ensure that technology remains a force for good in our world. #Cybersecurity #Innovation #TEDxSpeaker #HackersEra #Entrepreneur #Inspiration
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 379
    • duration 36:05:11
    • Release Date 2024/06/19