4.24 (75 reviews)
☑ Advance Bug Bounty Practical Training.
☑ Advance Ethical Hacking Practical Training.
☑ Advance Penetration Testing Training.
☑ Pwning Linux Machine.
☑ Pwning Windows Machine.
☑ Setup your first Amazon EC2 Instance (Elastic Compute Cloud).
☑ Post Exploitation Attacks.
☑ Finding and Submitting Bug Reports.
☑ Automating Bug Hunting Tasks.
☑ Setup and Install Kali Linux VM on VMWare Workstation.
☑ Basic Linux Networking, Files & Folders and Extra Commands.
☑ Learn to Setup and Use Burpsuite.
☑ Automation using burpsuite to find Sensitive/Critical Files.
☑ Exploiting XSS (Cross Site Scripting) using Beef Framework and Injecting Malicious Commands.
☑ Local File Inclusion (LFI) and Remote File Inclusion (RFI) Vulnerabilities.
Advance Ethical Hacking, Bug Bounty Hunting & Penetration Testing Course 2021
Learn Advance skills for finding bugs in websites, penetration testing on Windows and Linux machine. Setting up free Labs on Amazon EC2 (Elastic Compute Cloud) Instance. At the end of this course you will get links to download tools which we have used while making this course. You will learn below skills from this course.
Setup and Install Kali Linux VM on VMWare Workstation.
Setup your first Amazon EC2 Instance (Elastic Compute Cloud).
Basic Linux Networking, Files & Folders and Extra Commands.
Learn to Setup and Use Burpsuite.
Hunt Host Header Attack Bugs.
Create Custom Wordlists, Bruteforce Username and Password, Bypass Anti CSRF Protection.
Automation using burpsuite to find Sensitive/Critical Files.
Use Google Dork to find Sensitive Files.
Find your first XSS Bug (Cross Site Scripting) both manual and automation methods.
Exploiting XSS (Cross Site Scripting) using Beef Framework and Injecting Malicious Commands.
Basic and Advance SQL Injection Attacks.
Command Injection Attacks.
Finding File Upload Vulnerabilities.
Local File Inclusion (LFI) and Remote File Inclusion (RFI) Vulnerabilities.
Detailed Guide to Find Bug Bounty Programs and How to Submit your first Bug.
Recent Proof of Concept (POC) videos of live Websites.
Introduction to HacktheBox and Steps to Register your account on HacktheBox.
Penetration Testing: Capturing User & Root flag on HacktheBox for both Windows and Linux Machines.
Download link for Free Tools which are used in this Course.
Disclaimer : All video's and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers.
00.01 Course Introduction
Advance Ethical Hacking Bug Bounty Hunting & Penetration Testing - PDF
01 Setting up Lab
01.01 Intro - Setting up Lab
01.02 VMware workstation Setup
01.03 AWS EC2 - Launching Kali Instance
02 Basic Linux Commands
02.01 Basic Linux Commands Introduction
02.02 Commands Related to files and folders
02.03 Neworking Commands
02.04 Extra Commands
03 Burpsuite Introduction
03.01 Burpsuite Introduction
03.02 Setting up BurpSuite and Burp Proxy
04 Host Header Attack
04.01 Host Header Attack Intro
04.02 Open Redirection Host Header Attack
04.03 Other Host Header Attack Types
05 Brute Force Attack
05.01 Brute Force Attack Introduction
05.02 Create Custom WordList & Kali Default WordList
05.03 Bruteforce Username & Password Using Burpsuit
05.04 Bruteforce Anti CSRF Token Protected Password
05.05 Bruteforce Password Using Hydra
06 Sensitive File Found Vulnerability
06.01 Introduction - Sensitive File Found Vulnerability
06.02 Finding Sensitive Files Using Google Dork
06.03 Find Sensitive Files using BurpSuite
07 Basic XSS Attack
07.01 Cross Site Scripting Introduction
07.02 DVWA Low Security - Dom_Reflected_Stored XSS
07.03 DVWA Medium Security -DOM_Reflected_Stored XSS
07.04 XSS Automation - Burpsuite & Hackbar
07.05 Find XSS in Host Header
08 Advance XSS Attack
08.01 DVWA High Level XSS
08.02 Hook Victim to Beef using XSS
08.03 Inject Commands on Hooked Browser
09 Basic SQL Injection Attack
09.01 SQL Injection Introduction
09.02 SQL Manual SQLI Attack on Low Level Security
09.03 SQLI Medium Security using BurpSuite
09.04 Blind SQLI Low Level Security - sqlmap
09.05 Blind SQLI Medium Level Security - sqlmap
10 Advance SQL Injection Attack
10.01 SQL Injection on High Level Security
10.02 Blind SQL Injection - High Level Security
10.03 SQL Injection Attack on Live Website Part 1
10.04 SQL Injection Attack on Live Website Part 2
11 Command Injection
11.01 Introduction to Command Injection
11.02 Command Injection attack on Low Level Security
11.03 Command Injection Attack on Medium Level Security
11.04 Command Injection Attack on High Security
11.05 Command Injection Exploitation - Reverse Shell
12 File Upload Vulnerability12 File Upload Vulnerability
12.01 Introduction to File Upload Vulnerability
12.02 Upload Shell and Execute Commands on Low Security
12.03 Upload Shell and Execute Commands - Medium Security
12.04 File Upload Vulnerability on High Security
13 Local File Inclusion
13.01 File Inclusion Vulnerabilities - Introduction
13.02 Local File Inclusion - Low Security
13.03 Local File Inclusion - Medium Security
13.04 Local File Inclusion - High Security
14 Remote File Inclusion
14.01 Remote File Inclusion - Low Security
14.02 Remote File Inclusion - Medium Security
15 Submitting Bug Reports
15.01 Submitting Bug Reports
15.02 Live Website Bug Reports
16 Live Website Vulnerabilities - POC ( Proof of Concept )
Cross Site Scripting Attack
Host Header Attack 1
Host Header Attack Vulnerability
Host Header Attack
The Atlantic ClickJacking
17 HackTheBox Introduction
17.01 Hack The Box Introduction
17.02 Register Hack the Box Account
18 Capturing Windows Machine Flags
18.01 Finding retired windows machine user flag
18.02 Capture Reel2 Root Flag
19 Capturing Linux Machine Flags
19.01 Capturing User Flag - HTB Delivery
19.02 Capturing Root Flag - HTB Delivery
20 Some useful tools and download links
20.01 Tools Download Link
I really enjoyed the course you made which includes good information and methods to do stuffs. So far its good stuff but I think my should explain a bit more and provide more explanation and information on certain task, because throughout the course sometime I got confused and curious. Thank You the this Packaged you made. I would like to see more advance course on Bug Bounty Hunting if not the best one.
This course is not good ,, and prepared just to earn money .. ,, The author is try to speak english fast ,, bakwass h banchod tera course