Practical Bug Bounty - Web Application Security and Penetration Testing
Cyber Mentor via YouTube
-
12
-
- Write review
Give the Gift That Unlocks Potential
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Syllabus
- Intro
- Keeper Security Sponsorship
- Course Introduction
- Importance of Web App Security
- Web App Security Standards and Best Practices
- Bug Bounty Hunting vs Penetration Testing
- Phases of a Web App Pentest
- CryptoCat Introduction
- Understanding Scope, Ethics, Code of Conduct, etc.
- Common Scoping Mistakes
- Installing VMWare / VirtualBox
- Installing Linux
- Lab Installation
- Web Technologies
- HTTP & DNS
- Fingerprinting Web Technologies
- Directory Enumeration and Brute Forcing
- Subdomain Enumeration
- Burp Suite Overview
- Introduction to Authentication
- Brute-force Attacks
- Attacking MFA
- Authentication Challenge Walkthrough
- Intro to Authorization
- IDOR - Insecure Direct Object Reference
- Introduction to APIs
- Broken Access Control
- Testing with Autorize
- Introduction to LFI/RFI
- Local File Inclusion Attacks
- Remote File Inclusion Attacks
- File Inclusion Challenge Walkthrough
- Conclusion
Taught by
The Cyber Mentor
Reviews
4.0 rating, based on 1 Class Central review
-
Good For basics , try solving the labs at the same time , also liked the way of recon cause it was simple , for beginners it's okay but if you want to improve your chances than develop your own