Udemy - Advance Bug Bounty Hunting & Penetration Testing Course 2021

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size1.8 GB
  • Uploaded BynotmrME
  • Downloads126
  • Last checkedJul. 01st '21
  • Date uploadedJun. 29th '21
  • Seeders 7
  • Leechers3

Infohash : 14EBF439886C1C63DD4A78AC36A7B39259A73077

Knowledge should not be limited to those who can afford it or those willing to pay for it. If you found this course useful and are financially stable please consider supporting the creators by buying the course :)


Advance Bug Bounty Hunting & Penetration Testing Course 2021



Learn and Upgrade your Bug Bounty Hunting & Penetration Testing Skills with Advance Methods.
Original Price: CA$139.99




Description



​Advance Ethical Hacking, Bug Bounty Hunting & Penetration Testing Course 2021

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Learn Advance skills for finding bugs in websites, penetration testing on Windows and Linux machine. Setting up free Labs on Amazon EC2 (Elastic Compute Cloud) Instance. At the end of this course you will get links to download tools which we have used while making this course. You will learn below skills from this course.

  • Setup and Install Kali Linux VM on VMWare Workstation .
  • Setup your first Amazon EC2 Instance (Elastic Compute Cloud).
  • Basic Linux Networking, Files & Folders and Extra Commands.
  • Learn to Setup and Use Burpsuite.
  • Hunt Host Header Attack Bugs.
  • Create Custom Wordlists, Bruteforce Username and Password, Bypass Anti CSRF Protection .
  • Automation using burpsuite to find Sensitive/Critical Files .
  • Use Google Dork to find Sensitive Files.
  • Find your first XSS Bug (Cross Site Scripting) both manual and automation methods.
  • Exploiting XSS (Cross Site Scripting) using Beef Framework and Injecting Malicious Commands .
  • Basic and Advance SQL Injection Attacks .
  • Command Injection Attacks.
  • Finding File Upload Vulnerabilities .
  • Local File Inclusion (LFI) and Remote File Inclusion (RFI) Vulnerabilities.
  • Detailed Guide to Find Bug Bounty Programs and How to Submit your first Bug .
  • Recent Proof of Concept (POC) videos of live Websites.
  • Introduction to HacktheBox and Steps to Register your account on HacktheBox .
  • Penetration Testing: Capturing User & Root flag on HacktheBox for both Windows and Linux Machines.
  • Download link for Free Tools which are used in this Course.



Disclaimer :

All video's and tutorials are for informational and educational purposes only. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers.

Files:

Advance Bug Bounty Hunting & Penetration Testing Course 2021 08 07 Basic XSS Attack
  • 004 07.04 XSS Automation - Burpsuite & Hackbar.mp4 (88.6 MB)
  • 001 07.01 Cross Site Scripting Introduction.mp4 (13.0 MB)
  • 002 07.02 DVWA Low Security - Dom_Reflected_Stored XSS.mp4 (39.3 MB)
  • 003 07.03 DVWA Medium Security -DOM_Reflected_Stored XSS.mp4 (54.2 MB)
  • 005 07.05 Find XSS in Host Header.mp4 (35.0 MB)
01 00 Introduction
  • 002 Advance Ethical Hacking Bug Bounty Hunting & Penetration Testing - PDF.html (1.3 KB)
  • 002 Advance Ethical Hacking Bug Bounty Hunting & Penetration Testing PDF.pdf (2.4 MB)
  • 001 00.01 Course Introduction.mp4 (11.1 MB)
02 01 Setting up Lab
  • 001 01.01 Intro - Setting up Lab.mp4 (2.5 MB)
  • 002 01.02 VMware workstation Setup.mp4 (16.9 MB)
  • 003 01.03 AWS EC2 - Launching Kali Instance.mp4 (47.1 MB)
03 02 Basic Linux Commands
  • 001 02.01 Basic Linux Commands Introduction.mp4 (3.0 MB)
  • 002 02.02 Commands Related to files and folders.mp4 (44.1 MB)
  • 003 02.03 Neworking Commands.mp4 (27.1 MB)
  • 004 02.04 Extra Commands.mp4 (10.1 MB)
04 03 Burpsuite Introduction
  • 001 03.01 Burpsuite Introduction.mp4 (2.3 MB)
  • 002 03.02 Setting up BurpSuite and Burp Proxy.mp4 (13.4 MB)
05 04 Host Header Attack
  • 001 04.01 Host Header Attack Intro.mp4 (7.3 MB)
  • 002 04.02 Open Redirection Host Header Attack.mp4 (41.5 MB)
  • 003 04.03 Other Host Header Attack Types.mp4 (22.6 MB)
06 05 Brute Force Attack
  • 001 05.01 Brute Force Attack Introduction.mp4 (6.9 MB)
  • 002 05.02 Create Custom WordList & Kali Default WordList.mp4 (20.4 MB)
  • 003 05.03 Bruteforce Username & Password Using Burpsuit.mp4 (30.7 MB)
  • 004 05.04 Bruteforce Anti CSRF Token Protected Password.mp4 (55.5 MB)
  • 005 05.05 Bruteforce Password Using Hydra.mp4 (36.9 MB)
07 06 Sensitive File Found Vulnerability
  • 001 06.01 Introduction - Sensitive File Found Vulnerability.mp4 (13.0 MB)
  • 002 06.02 Finding Sensitive Files Using Google Dork.mp4 (37.8 MB)
  • 003 06.03 Find Sensitive Files using BurpSuite.mp4 (47.0 MB)
09 08 Advance XSS Attack
  • 001 08.01 DVWA High Level XSS.mp4 (55.4 MB)
  • 002 08.02 Hook Victim to Beef using XSS.mp4 (45.7 MB)
  • 003 08.03 Inject Commands on Hooked Browser.mp4 (26.5 MB)
10 09 Basic SQL Injection Attack
  • 001 09.01 SQL Injection Introduction.mp4 (7.2 MB)
  • 002 09.02 SQL Manual SQLI Attack on Low Level Security.mp4 (61.1 MB)
  • 003 09.03 SQLI Medium Security using BurpSuite.mp4 (26.7 MB)
  • 004 09.04 Blind SQLI Low Level Security - sqlmap.mp4 (69.1 MB)
  • 005 09.05 Blind SQLI Medium Level Security - sqlmap.mp4 (42.7 MB)
11 10 Advance SQL Injection Attack
  • 001 10.01 SQL Injection on High Level Security.mp4 (26.3 MB)
  • 002 10.02 Blind SQL Injection - High Level Security.mp4 (56.0 MB)
  • 003 10.03 SQL Injection Attack on Live Website Part 1.mp4 (24.3 MB)
  • 004 10.04 SQL Injection Attack on Live Website Part 2.mp4 (45.1 MB)
12 11 Command Injection
  • 001 11.01 Introduction to Command Injection.mp4 (13.1 MB)
  • 002 11.02 Command Injection attack on Low Level Security.mp4 (31.3 MB)
  • 003 11.03 Command Injection Attack on Medium Level Security.mp4 (15.4 MB)
  • 004 11.04 Command Injection Attack on High Security.mp4 (16.1 MB)
  • 005 11.05 Command Injection Exploitation - Reverse Shell.mp4 (25.2 MB)
13 12 File Upload Vulnerability
  • 001 12.01 Introduction to File Upload Vulnerability.mp4 (11.5 MB)
  • 002 12.02 Upload Shell and Execute Commands on Low Security.mp4 (25.4 MB)
  • 003 12.03 Upload Shell and Execute Commands - Medium Security.mp4 (40.1 MB)
  • 004 12.04 File Upload Vulneravility on High Security.mp4 (46.2 MB)
14 13 Local File Inclusion
  • 001 13.01 File Inclusion Vulnerabilities - Introduction.mp4 (22.7 MB)
  • 002 13.02 Local File Inclusion - Low Security.mp4 (39.5 MB)
  • 003 13.03 Local File Inclusion - Medium Security.mp4 (23.3 MB)
  • 004 13.04 Local File Inclusion - High Security.mp4 (21.8 MB)
15 14 Remote File Inclusion
  • 001 14.01 Remote File Inclusion - Low Security.mp4 (18.2 MB)
  • 002 14.02 Remote File Inclusion - Medium Security.mp4 (18.8 MB)
16 15 Submitting Bug Reports
  • 001 15.01 Submitting Bug Reports.mp4 (5.6 MB)
  • 002 15.02 Live Website Bug Reports.mp4 (23.5 MB)
17 16 Live Website Vulnerabilities - POC ( Proof of Concept )
  • 001 ClickJacking Vulnerability.mp4 (6.7 MB)
  • 002 Cross Site Scripting Attack.mp4 (13.3 MB)
  • 003 Host Header Attack 1.mp4 (7.2 MB)
  • 004 Host Header Attack Vulnerability.mp4 (11.7 MB)
  • 005 Host Header Attack.mp4 (16.4 MB)
  • 006 Parameter Tampering.mp4 (18.8 MB)
  • 007 The Atlantic ClickJacking.mp4 (10.3 MB)
18 17 HackTheBox Introduction
  • 001 17.01 Hack The Box Introduction.mp4 (16.1 MB)
  • 002 17.02 Register Hack the Box Account.mp4 (85.9 MB)
19 20 Some useful tools and download links
  • 001 20.01 Tools Download Link.html (2.4 KB)

Code:

  • UDP://TRACKER.LEECHERS-PARADISE.ORG:6969/ANNOUNCE
  • UDP://TRACKER.COPPERSURFER.TK:6969/ANNOUNCE
  • UDP://TRACKER.OPENTRACKR.ORG:1337/ANNOUNCE
  • UDP://TRACKER.ZER0DAY.TO:1337/ANNOUNCE
  • UDP://EDDIE4.NL:6969/ANNOUNCE
  • udp://tracker.openbittorrent.com:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://www.torrent.eu.org:451/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://retracker.lanta-net.ru:2710/announce
  • udp://open.stealth.si:80/announce
  • udp://valakas.rollo.dnsabr.com:2710/announce
  • udp://opentor.org:2710/announce
  • udp://wassermann.online:6969/announce