Web Application Penetration Testing (Bug Bounty)
Here is the Demo Video of this Course
Course Curriculum
Course Content
Read me
Read Me
You don't currently have access to this content
Website Basics
Introduction to Website
You don't currently have access to this content
HTTP Methods
You don't currently have access to this content
HTTP Status Code
You don't currently have access to this content
HTTP vs HTTPS Protocol
You don't currently have access to this content
Information Gathering
Information Gathering-1
You don't currently have access to this content
Information Gathering-2
You don't currently have access to this content
Information Gathering-3
You don't currently have access to this content
Information Gathering-4
You don't currently have access to this content
Finding Sub-Domain
You don't currently have access to this content
Understanding Google Hacking
You don't currently have access to this content
Google Dorks
You don't currently have access to this content
Dig Tool
You don't currently have access to this content
Discover Script
You don't currently have access to this content
theHarvester
You don't currently have access to this content
Introduction to Burp Suite
Introduction to Burp Suite
You don't currently have access to this content
Adding Certificate
You don't currently have access to this content
Various add-ons for Browser
You don't currently have access to this content
Setup Lab
Installing Kali
You don't currently have access to this content
Installing Metasploitable-v2
You don't currently have access to this content
Cross Site Scripting (XSS)
XSS (Part-1)
You don't currently have access to this content
XSS (Part-2)
You don't currently have access to this content
XSS Challenge
You don't currently have access to this content
Code Execution
Code Execution
You don't currently have access to this content
Cross Site Request Forgery (CSRF)
CSRF (Part-1)
You don't currently have access to this content
CSRF (Part-2)
You don't currently have access to this content
File Upload Vulnerability
File Upload Vulnerability (Part-1)
You don't currently have access to this content
File Upload Vulnerability (Part-2)
You don't currently have access to this content
Local File Inclusion (LFI)
LFI (Part-1)
You don't currently have access to this content
LFI (Part-2)
You don't currently have access to this content
LFISuite
You don't currently have access to this content
LFI using PHP wrapper
You don't currently have access to this content
Remote File Inclusion (RFI)
Remote File Inclusion
You don't currently have access to this content
Captcha Bypass
CaptchaBypass
You don't currently have access to this content
Authorization and post exploitation (Adding Users)
Authorization
You don't currently have access to this content
Post exploitation (user)
You don't currently have access to this content
Redirection
Open Redirection (Part-1)
You don't currently have access to this content
Open redirection (Part-2)
You don't currently have access to this content
URL Redirection (Part-1)
You don't currently have access to this content
URL Redirection (Part-2)
You don't currently have access to this content
Sender Policy Framework (SPF)
SPF
You don't currently have access to this content
XPATH
XPATH
You don't currently have access to this content
Form for Internship/Project Letter
Read Me
You don't currently have access to this content
Form
You don't currently have access to this content