fbpx
4.47 out of 5
4.47
62 reviews on Udemy

Burp Suite Bug Bounty Web Hacking from Scratch

Become highly paid Bug Bounty hunter and Earn Money Ethically, Web Hacking and Security
Instructor:
Hackers Cloud Security
5,517 students enrolled
English [Auto-generated]
Set up a lab environment to practice Bug Bounty Web Hacking
Familiar with Burp Suite pen testing tool
Intercepting requests using a proxy
Learn OWASP top 10 vulnerabilities
Bypass login forms and login as admin using SQL injections
Discover XSS vulnerabilities
Sensitive information gathering about websites
How professional penetration testing works
Find security vulnerabilities in web applications
Hacking report study
Earn by hacking legally
  • This course is complete Bug bounty hunting is the art of finding security vulnerabilities or bugs in a website and responsible for disclosing it to that company’s security team in a legitimate way.
    • Wants to earn Millions of Dollars from Bug Bounty Hunting?
    • Thinking become highly paid Bug Bounty hunter?
    • Does Penetration Testing or Ethical Hacking interests you?
  • Bug bounty programs have become a solid staple to help turn hackers and computer security researchers away from any black hat activity.
  • Bug bounty programs impact over 523+ international security programs world wide..
  • Burp suite: this tool makes you Millionaire. I believe this course will be a tremendous guide for your bug bounty journey.
  • This course contains rich, real world examples of security vulnerabilities testing and reports that resulted in real bug bounties.
  • This course is centered around the practical side of penetration testing on Burp to Test for the OWASP Top Ten vulnerabilities without ignoring the theory behind each attack. This course will help you to get started in bug bounty program..
  • NOTE: All the contents created for educational purposes only and all the practical attacks are launched in my own devices.

Introduction

1
Course Introduction

Getting Started with Ethical Hacking Lab Setup

1
Burp Suite Installation
2
OWASP Broken Web Application Installation
3
Bee-Box Bwapp installation

Getting Started with Bug Bounty Hunting

1
Bug Bounty Introduction
2
Bug Bounty Program
3
Types of Bug Bounty Programs
4
Discuss How Bug Bounty Process
5
Methodologies of Bug Bounty Hunting
6
How to Become Bug Bounty Hunter

Getting Started with Burp Suite

1
Getting Started with Burp Suite
2
Burp Suite Introduction
3
Defining Web Application Target in Burp Suite

Burp Suite Tools Introductions

1
Introduction to Burp Proxy tab
2
How to configure proxy and intercept request
3
How to Import Burp CA Certificate
4
Getting Started with Burp Suite Repeater Tool
5
Getting Started with Burp Suite Decoder Tool
6
Burp Suite Comparer: How to identify and evaluate varied server responses
7
Getting Started with Burp Suite Sequencer Tool
8
Supplemental Engagement Tools in Burp Suite

Broken Authentication and Session Management

1
Getting Started With Broken Authentication and Session Management
2
Brute Force Attack on Login Page using Burp
3
SQL Injection Login Page bypass
4
Prevention Broken Authentication and Session Management Vulnerabilities

Insecure Direct Object Reference Vulnerability

1
Getting Started with Insecure Direct Object Reference
2
How it will work IDOR Vulnerability

Security Miss Configuration Vulnerabilities

1
Getting started with Security Miss Configuration Vulnerabilities
2
Security Miss Configuration on secret administrative pages
3
Directory Listing Vulnerabilities

SQL Injection Vulnerabilities

1
Getting Started with SQL Injection vulnerability
2
How to Find SQL Injection vulnerabilities
3
Find SQL Vulnerability with multiple ways

Cross Site Scripting(XSS) Vulnerability

1
Cross Site Scripting overview
2
XSS Vulnerability found in Reflected search form
3
XSS Vulnerability with Low Medium and High Security Levels
4
XSS Vulnerability Impact in our Real Life and Prevention

Various Injection Vulnerabilities and Attacks

1
Getting Started with Injection Attacks
2
Getting Started with Directory Path Traversal
3
Directory Path Traversal Example and Prevention

Cookie Session Vulnerability Crash

1
Getting Started with Cookie
2
Getting started with Session IDs
3
How to Hack Cookies and Sessions Manipulation
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don`t have an internet connection, some instructors also let their students download course lectures. That`s up to the instructor though, so make sure you get on their good side!
4.5
4.5 out of 5
62 Ratings

Detailed Rating

Stars 5
29
Stars 4
13
Stars 3
14
Stars 2
5
Stars 1
1