Bug Bounty Hunting - Website Hacking Penetration Testing

Torrent Details


Bug Bounty Hunting - Website Hacking Penetration Testing

NAME
Bug Bounty Hunting - Website Hacking Penetration Testing.torrent
CATEGORY
Other
INFOHASH
38184653c0859377b41b848535d303d789f9c407
SIZE
1.7 GB in 71 files
ADDED
Uploaded on 12-10-2021 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

1hack.us | Together We Learn!







Created by: Paratosh Kumar

Last Updated: 12/2019

Language: English

Runtime: 3h 17m

Torrent Contains: 72 Files, 18 Folders

Course Source: https://www.udemy.com/course/bug-bounty-hunting-guide/



Become a Successful Bug Bounty Hunter



This course includes:

- 3.5 hours on-demand video

- Full lifetime access

- Access on mobile and TV

- Certificate of completion



What you'll learn:



• How to identify and distinguish different types of bugs.

• Finding bugs in real-world websites.

• To create a bug report with its complete description.

• Methods of earning through bug documentation on the websites.

• Rewards you can get from Bug Hunting on a website.

• Live POCs of websites.



Requirements:



• A laptop with a strong internet connection.

• Basic knowledge of web technologies.

• Basic computer and Internet browsing knowledge.



Description:



This Bug Bounty Hunting program includes all the methods to find any vulnerability in websites/ web applications and their exploitation and is designed to inform all the latest vulnerabilities on websites like CSRF attacks, Web Application attacks, Injection attacks, and many more. You will also learn the procedure in which you get paid or earn many other rewards by documenting and disclosing these bugs to the website’s security team. So, this course will give you a precise introduction to the bugs that you can report and earn money.



Who this course is for:



• Anyone who wants to earn from Bug Hunting.



Instructor:



Paratosh Kumar, Paratosh Bansal has an excellent grip on VAPT of Web apps, Mobile apps, Servers, IoT enabled devices, AI/ML-based applications and Network Infrastructure. He has wide domain experience of working with companies in healthcare, telecommunications, FinTech, E-Commerce, Smart Devices, and IT Infrastructure Companies. He has helped companies like Airtel, PVR Cinemas, Max Life Insurance, Citrus Payment Gateway with the security of their IT assets. He also follows his passion to train the youth and has trained over 10,000+ students and working professionals as well.



1280x720 - MP4 - Audio 128kbps - Bitrate (Specific Rates)






SIMILAR



TORRENT
 
UPLOADEDSIZESEEDS
LEECHS


Bounty Hunters 2017 Season 2 Complete 720p HDTV x264 [i_c] by ice_cracked










2 years
1.40 GB2
1


Teenage Bounty Hunters S01 Complete 720p NF WEB-DL Dual Audio [Hindi + English] ⭐4.4 GB⭐ ESub 2CH x264 - Shadow (BonsaiHD) by kayl1337










1 year
4.38 GB137
91


Battlebots Bounty Hunters S01 720p WEBRip AAC2 0 x264-MIXED EZTV by eztv










7 months
12.51 GB1
0

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1.Introduction to Bug Bounty/2645912-01 - What is a Bug Bounty Program - Bug Bounty Hunting Guide to an Advanced Earning Method.mp49.5 MB
1.Introduction to Bug Bounty/2645912-02 - Popular Bug Bounty Platforms - Bug Bounty Hunting Guide to an Advanced Earning Method.mp48.8 MB
1.Introduction to Bug Bounty/2645912-03 - BugCrowd - Bug Bounty Hunting Guide to an Advanced Earning Method.mp424.7 MB
1.Introduction to Bug Bounty/2645912-04 - HackerOne - Bug Bounty Hunting Guide to an Advanced Earning Method.mp410.7 MB
1.Introduction to Bug Bounty/2645912-05 - Benefits of Bug Bounty - Bug Bounty Hunting Guide to an Advanced Earning Method.mp49.4 MB
1.Introduction to Bug Bounty/2645912-06 - Brief About Common Vulnerabilities - Bug Bounty Hunting Guide to an Advanced Earning Method.mp49.8 MB
1.Introduction to Bug Bounty/2645912-07 - Hacking Terminologies - Bug Bounty Hunting Guide to an Advanced Earning Method.mp424 MB
10.Brute Forcing/2645912-55 - Brief About Brute Force - Bug Bounty Hunting Guide to an Advanced Earning Method.mp417.3 MB
10.Brute Forcing/2645912-56 - Brute Force DVWA - Bug Bounty Hunting Guide to an Advanced Earning Method.mp422.8 MB
10.Brute Forcing/2645912-57 - Live OTP Brute Force POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp421.8 MB
11.Security Misconfigurations_ Exploiting Web Apps/2645912-58 - Security Misconfigurations _ Improper Handling - Bug Bounty Hunting Guide to an Advanced Earning Method.mp433.1 MB
11.Security Misconfigurations_ Exploiting Web Apps/2645912-59 - Guessing Weak Passwords - Bug Bounty Hunting Guide to an Advanced Earning Method.mp436.1 MB
11.Security Misconfigurations_ Exploiting Web Apps/2645912-60 - Live SPF Record Missing POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp45 MB
12.Insecure CORS/2645912-61 - 12.1 Concept About Insecure CORS (Voice Issue) Completed - Bug Bounty Hunting Guide to an Advanced Earning Method.mp425.4 MB
13.File Inclusion Vulnerability/2645912-62 - Remote File Inclusion - Bug Bounty Hunting Guide to an Advanced Earning Method.mp410 MB
13.File Inclusion Vulnerability/2645912-63 - Local File Inclusion - Bug Bounty Hunting Guide to an Advanced Earning Method.mp414.5 MB
13.File Inclusion Vulnerability/2645912-64 - File Inclusion (DVWA) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp421.5 MB
13.File Inclusion Vulnerability/2645912-65 - Live LFI POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp423.5 MB
14.Server-Side Request Forgery/2645912-66 - What is SSRF - Bug Bounty Hunting Guide to an Advanced Earning Method.mp425.5 MB
15.Insecure Captcha/2645912-67 - Brief About Insecure Captcha - Bug Bounty Hunting Guide to an Advanced Earning Method.mp416.6 MB
15.Insecure Captcha/2645912-68 - Live Captcha Bypass POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp417.7 MB
16.Automating VAPT _ Advanced Information Gathering/2645912-69 - Introduction to Automated VAPT _ Advance Level Information Gathering - Bug Bounty Hunting Guide to an Advanced Earning Method.mp440 MB
17.Documenting _ Reporting Vulnerability/2645912-70 - Introduction to VAPT Reporting - Bug Bounty Hunting Guide to an Advanced Earning Method.mp456.3 MB
18. Conclusion of Bug Bounty/2645912-71 - Conclusion of Bug Bounty - Bug Bounty Hunting Guide to an Advanced Earning Method.mp46.4 MB
2.Information Gathering/2645912-08 - What is Information Gathering - Bug Bounty Hunting Guide to an Advanced Earning Method.mp412.8 MB
2.Information Gathering/2645912-09 - Concept of Digital Footprinting - Bug Bounty Hunting Guide to an Advanced Earning Method.mp45.3 MB
2.Information Gathering/2645912-10 - What Information to Gather - Bug Bounty Hunting Guide to an Advanced Earning Method.mp410.3 MB
2.Information Gathering/2645912-11 - What is Whois Information - Bug Bounty Hunting Guide to an Advanced Earning Method.mp427.8 MB
2.Information Gathering/2645912-12 - Information Gathering About People _ Organisation - Bug Bounty Hunting Guide to an Advanced Earning Method.mp442.2 MB
2.Information Gathering/2645912-13 - Gathering Information About Websites - Bug Bounty Hunting Guide to an Advanced Earning Method.mp450.1 MB
2.Information Gathering/2645912-14 - Google Dorking _ GHDB - Bug Bounty Hunting Guide to an Advanced Earning Method.mp446.6 MB
3.Setting Up Labs/2645912-15 - DVWA Introduction _ Configuration - Bug Bounty Hunting Guide to an Advanced Earning Method.mp430.2 MB
3.Setting Up Labs/2645912-16 - bWAPP Introduction _ Configuration - Bug Bounty Hunting Guide to an Advanced Earning Method.mp419.8 MB
4.Introduction to Burp Suite/2645912-17 - Introduction to Burp Suite - Bug Bounty Hunting Guide to an Advanced Earning Method.mp431.1 MB
4.Introduction to Burp Suite/2645912-18 - Steps to Configure - Bug Bounty Hunting Guide to an Advanced Earning Method.mp418.8 MB
5.SQL Injection/2645912-19 - Introduction to SQL - Bug Bounty Hunting Guide to an Advanced Earning Method.mp48.9 MB
5.SQL Injection/2645912-20 - Writing Basic SQL Query - Bug Bounty Hunting Guide to an Advanced Earning Method.mp424.7 MB
5.SQL Injection/2645912-21 - Different Types of Comments Used in SQL - Bug Bounty Hunting Guide to an Advanced Earning Method.mp410.4 MB
5.SQL Injection/2645912-22 - SQLi Introduction _ Impact - Bug Bounty Hunting Guide to an Advanced Earning Method.mp421.7 MB
5.SQL Injection/2645912-23 - Union Based SQLi - Bug Bounty Hunting Guide to an Advanced Earning Method.mp491.4 MB
5.SQL Injection/2645912-24 - Boolean Based SQLi - Bug Bounty Hunting Guide to an Advanced Earning Method.mp436.6 MB
5.SQL Injection/2645912-25 - Time based SQLi - Bug Bounty Hunting Guide to an Advanced Earning Method.mp422.7 MB
5.SQL Injection/2645912-26 - Validation Bypass (Client and Server) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp427 MB
5.SQL Injection/2645912-27 - IDOR Vulnerability - Bug Bounty Hunting Guide to an Advanced Earning Method.mp420.4 MB
6.Web Application Attacks/2645912-28 - IDOR (BWAPP) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp422.2 MB
6.Web Application Attacks/2645912-29 - Rate Limiting Flaw - Bug Bounty Hunting Guide to an Advanced Earning Method.mp432 MB
6.Web Application Attacks/2645912-30 - File Upload Vulnerability - Bug Bounty Hunting Guide to an Advanced Earning Method.mp412.9 MB
6.Web Application Attacks/2645912-31 - File Upload on DVWA - Bug Bounty Hunting Guide to an Advanced Earning Method.mp424.9 MB
6.Web Application Attacks/2645912-32 - Live IDOR POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp426.6 MB
6.Web Application Attacks/2645912-33 - Live Rate Limiting Flaw POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp416.1 MB
7.Cross Site Script (XSS)/2645912-34 - What Is Cross Site Scripting(XSS) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp420.6 MB
7.Cross Site Script (XSS)/2645912-35 - Stored XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp413.1 MB
7.Cross Site Script (XSS)/2645912-36 - Stored XSS (DVWA) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp430.2 MB
7.Cross Site Script (XSS)/2645912-37 - Reflected XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp413.4 MB
7.Cross Site Script (XSS)/2645912-38 - Reflected XSS (DVWA) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp427.1 MB
7.Cross Site Script (XSS)/2645912-39 - DOM Based XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp418 MB
7.Cross Site Script (XSS)/2645912-40 - Blind XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp412.4 MB
7.Cross Site Script (XSS)/2645912-41 - Live XSS POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp439.7 MB
8.Header Injection _ URL Redirection/2645912-42 - Host Header Injection Methods _ URL Redirection - Bug Bounty Hunting Guide to an Advanced Earning Method.mp451.9 MB
8.Header Injection _ URL Redirection/2645912-43 - Live Host Header Injection POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp426.4 MB
8.Header Injection _ URL Redirection/2645912-44 - Live URL Redirection POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp47.5 MB
9.Client Side Attacks/2645912-45 - Understanding Session, Cookie _ Session Fixation - Bug Bounty Hunting Guide to an Advanced Earning Method.mp453.9 MB
9.Client Side Attacks/2645912-46 - Forced Browsing - Bug Bounty Hunting Guide to an Advanced Earning Method.mp418.8 MB
9.Client Side Attacks/2645912-47 - Cross Site Request Forgery Introduction - Bug Bounty Hunting Guide to an Advanced Earning Method.mp434.9 MB
9.Client Side Attacks/2645912-48 - CSRF Attack (DVWA) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp422.2 MB
9.Client Side Attacks/2645912-49 - Open Redirection - Bug Bounty Hunting Guide to an Advanced Earning Method.mp414.2 MB
9.Client Side Attacks/2645912-50 - Personally Identifiable Information (PII) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp412.8 MB
9.Client Side Attacks/2645912-51 - 9.7 Sensitive Information Disclosure - Bug Bounty Hunting Guide to an Advanced Earning Method.mp45.1 MB
9.Client Side Attacks/2645912-52 - Live CSRF POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp461.3 MB
9.Client Side Attacks/2645912-53 - Live Sensitive Information POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp418.5 MB
9.Client Side Attacks/2645912-54 - Live Session Fixation POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp415.3 MB

Alternative Torrents for 'Bug Bounty Hunting Website Hacking Penetration Testing'.

There are no alternative torrents found.