Web Application Penetration Testing (Bug Bounty)

Here is the Demo Video of this Course

Course Curriculum

Course Content

Read me
Read Me
Website Basics
Introduction to Website
HTTP Methods
HTTP Status Code
HTTP vs HTTPS Protocol
Information Gathering
Information Gathering-1
Information Gathering-2
Information Gathering-3
Information Gathering-4
Finding Sub-Domain
Understanding Google Hacking
Google Dorks
Dig Tool
Discover Script
theHarvester
Introduction to Burp Suite
Introduction to Burp Suite
Adding Certificate
Various add-ons for Browser
Setup Lab
Installing Kali
Installing Metasploitable-v2
Cross Site Scripting (XSS)
XSS (Part-1)
XSS (Part-2)
XSS Challenge
Code Execution
Code Execution
Cross Site Request Forgery (CSRF)
CSRF (Part-1)
CSRF (Part-2)
File Upload Vulnerability
File Upload Vulnerability (Part-1)
File Upload Vulnerability (Part-2)
Local File Inclusion (LFI)
LFI (Part-1)
LFI (Part-2)
LFISuite
LFI using PHP wrapper
Remote File Inclusion (RFI)
Remote File Inclusion
Captcha Bypass
CaptchaBypass
Authorization and post exploitation (Adding Users)
Authorization
Post exploitation (user)
Redirection
Open Redirection (Part-1)
Open redirection (Part-2)
URL Redirection (Part-1)
URL Redirection (Part-2)
Sender Policy Framework (SPF)
SPF
XPATH
XPATH
Form for Internship/Project Letter
Read Me
Form