Udemy

Platform

English

Language

Network & Security

Category

Broad Scope Bug Bounties From Scratch

Finally learn what to do after recon

4.49 (121 reviews)

Broad Scope Bug Bounties From Scratch

Students

2 hours

Content

Jul 2021

Last Update
Regular Price

SKILLSHARE
SkillShare
Unlimited access to 30 000 Premium SkillShare courses
30-DAY FREE TRIAL

What you will learn

Bug bounty hunting on a broad scope target

What to do after recon

Working with a VPS

Automating your workflow


Description

Who am i?

I am The XSS Rat, also known as Wesley. I created infosec tutorials and courses in a unique way. It's my opinion that a teacher should be able to bring knowledge in an inspirational way but also make sure that knowledge is retained. This is a very unique challenge requiring out of the box thinking. My courses never just consist of a video or video + PDF only format. Courses should be interactive and not just boring reads of powerpoint slides.

Who is this course for?

Are you tired of seeing all these bug bounty methodologies that stop after the recon phase or give some general advice like look for vulnerable software on exploit-db? I am sick of it as well and in this course i guide a bug bounty hunter to a broad scope bug bounty hunter with a serious tool belt.

This course is made for hackers and developers who have the ultimate goal of automating their workflow.

Contents

- A video and PDF covering every topic required in broad scope bug bounties

- 2 learning paths to facilitate all types of hackers. You can go one way and come back to the other later on

- A list of extras such as a list of tools and a better way to perform directory brute forcing


Content

The Intricacies of bug bounties

Introduction

The Intricacies of bug bounties

The Intricacies of bug bounties

Broad scope methodology

Broad scope methodology - Manual

Broad scope methodology - Automated

Processing subdomains

Subdomain enumeration

3 Subdomain flyover

3 Subdomain flyover

4 Exploiting open ports

4 Exploiting open ports

A Vulnerability scanning

A Vulnerability scanning

B Our attack strategt

B Our attack strategy

97 Exploit-db examples

97 Exploit-db examples

Cheat sheets and extra's

Cheat sheets

Analysing javascript files

What the ffuf

Directory brute forcing

You are probably doing directory brute forcing wrong. Here's why!

Subdomain flyover

Running scripts on a VPS


Reviews

H
Humar27 June 2021

Uncle rat, thx for this informative course. It’s a must have course for anyone new to bug bounty , personally I would highly recommend this course.

D
Dhruv25 June 2021

this course is amazing !!! please purchase this course . Thank You Uncle Rat for making this wonderful Course

D
Divine24 June 2021

He is one of the most finest Ethical hacker I have ever met. His courses are very impactful on real life scenarios. Especially, XSS and others which is very simple for beginners. ??

V
Virang24 June 2021

The course is easy to grep and very informative, recommended for beginners, pros, technical, non-technical...


Coupons

DateDiscountStatus
6/23/2021100% OFFExpired
7/6/2021100% OFFExpired

3953536

Udemy ID

4/1/2021

Course created date

6/13/2021

Course Indexed date
Bot
Course Submitted by