We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8
EARN YOUR LIFE FIRST BOUNTY
BUG HUNTING LIVE TRAINING
PROGRAM DURATION
3 Months PROGRAM OVERVIEW
Welcome to Bug Training Live Training.
This Training covers web application attacks and how to earn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.
This Training is not like other hacking or penetration testing
Training with outdated vulnerabilities and only lab attacks. This contains maximum live websites to make you comfortable with the Live Hunting Environment. This course is highly practical and is made on Live websites to give you the exact environment TRAINING CONTENT:
Module 1 : Introduction to Bug Bounty Programs
What is Bug Bounty? How Bug Bounties Work Bug Bounty Platforms Overview Setting Expectations: Rewards, Reports, and Disclosures Understanding Bug Bounty Program Policies
Module 2 : Understanding Web Fundamentals
What is the Internet? IP Address, DNS, and Ports How Websites Work (Backend vs Frontend) Web Application Infrastructure HTTP Response Codes Explained Making Requests with Proxy Tools (Caido & BurpSuite Overview) Introduction to Regular Expressions (RegEx) Module 3 : Reconnaissance and Information Gathering Reconnaissance Basics: How to Approach a Target Subdomains Explained & Discovery Techniques Google Dorking Certificate Transparency and Tricks Shodan Explained & Examples Port Scanning with Hands-On Labs Module 4 : Cross-Site Scripting (XSS) Different Types of XSS (Reflected, Stored, Blind) Bypassing XSS Filters (Tips & Tricks) Content Security Policy (CSP) Bypasses Real-World XSS Exploitation and Case Studies
Module 5 : Cross-Site Request Forgery (CSRF)
CSRF Explained (GET & POST requests) Bypasses and Exploitation Tips Escalating Self-XSS with CSRF
Module 6 : Server-Side Request Forgery (SSRF)
SSRF Explained & Hands-On Labs Blacklisted/Whitelisted Resources Bypasses SSRF with Open Redirects, HTML Injection, XSS, and XXE Blind SSRF Exploitation
Module 7 : SQL Injection
Structured Query Language (SQL) Basics Error-Based, Boolean-Based, and Blind SQL Injection Exploiting SQLi for Data Enumeration and Exfiltration Real-World SQLi Case Studies Module 8 : File Upload Vulnerabilities Exploiting File Uploads for XSS & Remote Code Execution (RCE) Understanding File Upload Security Measures and Bypasses
Module 9 : Server-Side Vulnerabilities
Command Injection & Code Injection with RCE Labs XXE Vulnerabilities and Exploitation
Module 10 : Authentication and Session Exploitation
JSON Web Tokens (JWT) and Weak Credential Exploitation Username Enumeration Techniques Brute Force Techniques & Tools Exploiting One-Time Passwords (OTP) Password Reset Token Bypass Methods Forced Password Resets & Account Takeover (IDOR, OAuth, Mass Assignment)
Module 11 : Advanced Exploitation Techniques
Bypassing API Authentication using X-Forwarded-For Exploiting Single Sign-On (SSO) Mechanisms OAuth Flows and Account Takeovers Real-World Account Takeover Examples (XSS, Invite Systems) Module 12 : Advanced Recon Techniques Google Dorking for Sensitive Information Advanced Subdomain Discovery with Subfinder & Shodan HTTPx for Information Gathering
Module 13 : Practical Labs & Hands-On Hacking
XSS Labs (multiple levels) SSRF Labs (contextual exploitation) SQL Injection Labs (error-based, blind) Local File Read & File Upload Exploitation Hands-on Labs for IDOR and CSRF Real-World Recon Case Studies