Author: Rohit Gautam
Complete Practical Course on Ethical Hacking, Penetration Testing and Bug Bounty Hunting with Live Attacks
What you’ll learn
- Bug Bounty Hunting - Live
- Tips and Tricks to hunt bugs
- BreakDown of Hackerone Reports for better understanding
- Interview Preparation Questions Answers and Approach
- Web Application Penetration Testing—Live
- Become a bug bounty hunters & Hunt on Live Websites
- Intercept requests using a Burpsuite proxy
- Gain full control over target server using SQL Injection Attacks
- Discover vulnerabilities, technologies, & services used on the target website.
- Subdomain Takeovers
- SQLi Interview Questions and Answers
- Hunt Basic HTML Injection Vulnerabilities on Live Environments
- Hunt Basic ClickJacking Vulnerabilities on Live Environments
- Exploit and perform Local File Inclusion (LFI) on Live websites
- Exploit and perform RemoteFile Inclusion (RFI) on Live websites
- Exploit and perform Remote Code Execution (RCE) on Live websites
- Fix and Mitigations against SQLi Vulnerabilities
- Practical Tips and Tricks for hunting SQL Live
- Broken Link Hijacking
- Fix and Mitigations against RCE Vulnerabilities
- Interview Questions and answers
- Bug Bounty: Roadmap for Hackerone
- Bug Bounty: Roadmap for Bugcrowd
- Bug Bounty: Roadmap for Open Bug Bounty
- Bug Bounty: Roadmap for NCIIPC (Govt of India)
- Bug Bounty: Roadmap for RVDP All Programs
- Reporting Templates
- LINK