Udemy

Platform

English

Language

Network & Security

Category

Advance Bug Bounty Hunting & Penetration Testing Course 2021

Learn and Upgrade your Bug Bounty Hunting & Penetration Testing Skills with Advance Methods.

4.24 (75 reviews)

Students

7.5 hours

Content

May 2021

Last Update
Regular Price


What you will learn

Advance Bug Bounty Practical Training.

Advance Ethical Hacking Practical Training.

Advance Penetration Testing Training.

Pwning Linux Machine.

Pwning Windows Machine.

Setup your first Amazon EC2 Instance (Elastic Compute Cloud).

Post Exploitation Attacks.

Finding and Submitting Bug Reports.

Automating Bug Hunting Tasks.

Setup and Install Kali Linux VM on VMWare Workstation.

Basic Linux Networking, Files & Folders and Extra Commands.

Learn to Setup and Use Burpsuite.

Automation using burpsuite to find Sensitive/Critical Files.

Exploiting XSS (Cross Site Scripting) using Beef Framework and Injecting Malicious Commands.

Local File Inclusion (LFI) and Remote File Inclusion (RFI) Vulnerabilities.


Description

​Advance Ethical Hacking, Bug Bounty Hunting & Penetration Testing Course 2021

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Learn Advance skills for finding bugs in websites, penetration testing on Windows and Linux machine. Setting up free Labs on Amazon EC2 (Elastic Compute Cloud) Instance. At the end of this course you will get links to download tools which we have used while making this course. You will learn below skills from this course.

  • Setup and Install Kali Linux VM on VMWare Workstation.

  • Setup your first Amazon EC2 Instance (Elastic Compute Cloud).

  • Basic Linux Networking, Files & Folders and Extra Commands.

  • Learn to Setup and Use Burpsuite.

  • Hunt Host Header Attack Bugs.

  • Create Custom Wordlists, Bruteforce Username and Password, Bypass Anti CSRF Protection.

  • Automation using burpsuite to find Sensitive/Critical Files.

  • Use Google Dork to find Sensitive Files.

  • Find your first XSS Bug (Cross Site Scripting) both manual and automation methods.

  • Exploiting XSS (Cross Site Scripting) using Beef Framework and Injecting Malicious Commands.

  • Basic and Advance SQL Injection Attacks.

  • Command Injection Attacks.

  • Finding File Upload Vulnerabilities.

  • Local File Inclusion (LFI) and Remote File Inclusion (RFI) Vulnerabilities.

  • Detailed Guide to Find Bug Bounty Programs and How to Submit your first Bug.

  • Recent Proof of Concept (POC) videos of live Websites.

  • Introduction to HacktheBox and Steps to Register your account on HacktheBox.

  • Penetration Testing: Capturing User & Root flag on HacktheBox for both Windows and Linux Machines.

  • Download link for Free Tools which are used in this Course.


Disclaimer : All video's and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers.


Screenshots

Advance Bug Bounty Hunting & Penetration Testing Course 2021
Advance Bug Bounty Hunting & Penetration Testing Course 2021
Advance Bug Bounty Hunting & Penetration Testing Course 2021
Advance Bug Bounty Hunting & Penetration Testing Course 2021

Content

00 Introduction

00.01 Course Introduction

Advance Ethical Hacking Bug Bounty Hunting & Penetration Testing - PDF

01 Setting up Lab

01.01 Intro - Setting up Lab

01.02 VMware workstation Setup

01.03 AWS EC2 - Launching Kali Instance

02 Basic Linux Commands

02.01 Basic Linux Commands Introduction

02.02 Commands Related to files and folders

02.03 Neworking Commands

02.04 Extra Commands

03 Burpsuite Introduction

03.01 Burpsuite Introduction

03.02 Setting up BurpSuite and Burp Proxy

04 Host Header Attack

04.01 Host Header Attack Intro

04.02 Open Redirection Host Header Attack

04.03 Other Host Header Attack Types

05 Brute Force Attack

05.01 Brute Force Attack Introduction

05.02 Create Custom WordList & Kali Default WordList

05.03 Bruteforce Username & Password Using Burpsuit

05.04 Bruteforce Anti CSRF Token Protected Password

05.05 Bruteforce Password Using Hydra

06 Sensitive File Found Vulnerability

06.01 Introduction - Sensitive File Found Vulnerability

06.02 Finding Sensitive Files Using Google Dork

06.03 Find Sensitive Files using BurpSuite

07 Basic XSS Attack

07.01 Cross Site Scripting Introduction

07.02 DVWA Low Security - Dom_Reflected_Stored XSS

07.03 DVWA Medium Security -DOM_Reflected_Stored XSS

07.04 XSS Automation - Burpsuite & Hackbar

07.05 Find XSS in Host Header

08 Advance XSS Attack

08.01 DVWA High Level XSS

08.02 Hook Victim to Beef using XSS

08.03 Inject Commands on Hooked Browser

09 Basic SQL Injection Attack

09.01 SQL Injection Introduction

09.02 SQL Manual SQLI Attack on Low Level Security

09.03 SQLI Medium Security using BurpSuite

09.04 Blind SQLI Low Level Security - sqlmap

09.05 Blind SQLI Medium Level Security - sqlmap

10 Advance SQL Injection Attack

10.01 SQL Injection on High Level Security

10.02 Blind SQL Injection - High Level Security

10.03 SQL Injection Attack on Live Website Part 1

10.04 SQL Injection Attack on Live Website Part 2

11 Command Injection

11.01 Introduction to Command Injection

11.02 Command Injection attack on Low Level Security

11.03 Command Injection Attack on Medium Level Security

11.04 Command Injection Attack on High Security

11.05 Command Injection Exploitation - Reverse Shell

12 File Upload Vulnerability12 File Upload Vulnerability

12.01 Introduction to File Upload Vulnerability

12.02 Upload Shell and Execute Commands on Low Security

12.03 Upload Shell and Execute Commands - Medium Security

12.04 File Upload Vulnerability on High Security

13 Local File Inclusion

13.01 File Inclusion Vulnerabilities - Introduction

13.02 Local File Inclusion - Low Security

13.03 Local File Inclusion - Medium Security

13.04 Local File Inclusion - High Security

14 Remote File Inclusion

14.01 Remote File Inclusion - Low Security

14.02 Remote File Inclusion - Medium Security

15 Submitting Bug Reports

15.01 Submitting Bug Reports

15.02 Live Website Bug Reports

16 Live Website Vulnerabilities - POC ( Proof of Concept )

ClickJacking Vulnerability

Cross Site Scripting Attack

Host Header Attack 1

Host Header Attack Vulnerability

Host Header Attack

Parameter Tampering

The Atlantic ClickJacking

17 HackTheBox Introduction

17.01 Hack The Box Introduction

17.02 Register Hack the Box Account

18 Capturing Windows Machine Flags

18.01 Finding retired windows machine user flag

18.02 Capture Reel2 Root Flag

19 Capturing Linux Machine Flags

19.01 Capturing User Flag - HTB Delivery

19.02 Capturing Root Flag - HTB Delivery

20 Some useful tools and download links

20.01 Tools Download Link


Reviews

S
Sayan15 April 2021

I really enjoyed the course you made which includes good information and methods to do stuffs. So far its good stuff but I think my should explain a bit more and provide more explanation and information on certain task, because throughout the course sometime I got confused and curious. Thank You the this Packaged you made. I would like to see more advance course on Bug Bounty Hunting if not the best one.

A
Aditya15 April 2021

This course is not good ,, and prepared just to earn money .. ,, The author is try to speak english fast ,, bakwass h banchod tera course


Coupons

DateDiscountStatus
4/15/2021100% OFFExpired
4/19/2021100% OFFExpired
5/4/2021100% OFFExpired

3978312

Udemy ID

4/13/2021

Course created date

4/15/2021

Course Indexed date
Bot
Course Submitted by

Twitter
Telegram