V Hack
Security
WEB HACKING (BUG BOUNTY)
The aim of this course is to help the participant gain the skills and techniques necessary to take part in Bug Bounty programs, to detect bugs, earn rewards and play a critical role in
increasing the web security.
Course Overview
Welcome to Web Hacking – bug bounty course.
The purpose of this course is to provide students with an understanding of the methods that can be
used to hunt bugs on a website, its exploitation process, and the process of reporting bugs in an ethical
manner. The student will cover and perform OWASP top vulnerabilities such as SQL injection, Cross-Site
Scripting, session management flaws, and a variety of others. Also we will show you live hacking during
the session and enough challenges to practice along.
Who Should Attend
This course is intended for Security Professionals, Ethical Hackers, Penetration Testers or anyone who is
interested in Web application security, Bug bounty hunters and want to secure web.Course Content / Outline
Introduction to Bug Bounty
Introduction to toolkits
o Burp Suite
o Burp Suite setup and
configuration
Linux parrot OS or kali setup with VM
Information Gathering
o Dorks
o Linux tools
o Other websites
Useful Linux commands Lab practical
Vulnerabilities
o Cross site scripting
o Sql Injection
o HTML Injection
o Parameter Tampering
o URL Redirection / Open Redirection
o Missing/insufficient SPF record
o Rate limit bypass
o CSRF
o DOS
o Subdomain takeover
o File Uploading
o Android application Sensitive data
exposure
Documenting & Reporting VulnerabilitySign Up
We'll get in touch with you soon.
Contact Us
0777835888 | 076551656
shafeer@
Copyright © 2023