FileMood

Download [DesireCourse.Com] Udemy - Bug Bounty Hunting – Offensive Approach to Hunt Bugs

DesireCourse Com Udemy Bug Bounty Hunting Offensive Approach to Hunt Bugs

Name

[DesireCourse.Com] Udemy - Bug Bounty Hunting – Offensive Approach to Hunt Bugs

 DOWNLOAD Copy Link

Total Size

7.9 GB

Total Files

179

Hash

A3048251A1D5F972684CF6A75ED9BFD838F08470

/01 Introduction/

001 About Instructor.mp4

208.6 MB

002 Course Introduction and Overview.mp4

70.3 MB

003 Why you should take this.mp4

28.1 MB

004 Teaser of Offensive Approach to Hunt Bugs.mp4

1.1 GB

/02 Information Gathering Basic Terminologies/

005 Information Gathering.mp4

157.4 MB

/03 Introduction of Burpsuite/

006 Steps to Configure Burpsuite with Firefox.mp4

63.0 MB

007 How to Use Burpsuite - Spider Repeater Intruder.mp4

60.1 MB

/04 Comprehensive XSS/

008 Background Concept about XSS.mp4

44.1 MB

008 Background-Concept-XSS.m4v

11.0 MB

008 Background-XSS.pdf

26.4 KB

009 Basic XSS.mp4

162.8 MB

009 Basic-xss.pdf

19.1 KB

010 BASIC-XSS-ON-LAB.txt

1.2 KB

010 Basic XSS on Lab.mp4

209.3 MB

011 Manual Building XSS Vector.mp4

153.0 MB

011 Manual-xss.txt

0.8 KB

012 XSS through Filter Bypassed XSS payloads On Lab.mp4

123.4 MB

012 xss.txt

12.0 KB

013 XSS On Live Websites.mp4

245.3 MB

014 XSS Hunting Live Part 1.mp4

98.0 MB

015 XSS Hunting Live Part 2.mp4

176.7 MB

016 XSS Hunting Live Part 3.mp4

91.2 MB

017 XSS Through Header Parameter.mp4

65.6 MB

018 Reflected XSS Vs Stored XSS.mp4

54.3 MB

019 Exploitation of XSS - 1. URL Redirection.mp4

18.7 MB

020 Exploitation of XSS - 2. Phishing Through XSS.mp4

36.7 MB

021 Exploitation of XSS - 3. Cookie Stealing.mp4

91.2 MB

022 XSS Through File Uploading.mp4

47.6 MB

023 XSS Through Remote File Inclusion.mp4

18.5 MB

024 Convert Self XSS to Reflected XSS.mp4

41.8 MB

025 POC - 1 XSS Attack Discovered by Shubham Maheshwari.mp4

19.9 MB

026 POC - 2 XSS Attack Discovered by Shubham Maheshwari.mp4

11.4 MB

027 POC - 3 XSS Attack Discovered by Shubham Maheshwari.mp4

11.5 MB

028 POC 4 XSS Attack Discovered by Ankit Singh.mp4

15.1 MB

029 POC 5 XSS Attack Discovered by Ankit Singh.mp4

26.2 MB

030 POC 6 XSS Attack Discovered by Ankit Singh.mp4

37.1 MB

031 POC 7 XSS Attack Discovered by Ankit Singh.mp4

13.2 MB

032 POC 8 XSS Attack Discovered by Ankit Singh.mp4

21.9 MB

/05 Host Header Injection/

033 HHA.txt

1.2 KB

033 Overview of Host Header Injection.mp4

17.4 MB

034 Host Header Attack 1. Open Redirection.mp4

76.5 MB

035 Host Header Attack 2. Cache Poisoning.mp4

20.7 MB

036 Host Header Attack 3. Password Reset Poisoning.mp4

36.2 MB

037 Host Header Attack 4. XSS Through Host Header.mp4

32.0 MB

038 POC - 1 Host Header attack by Shubham Maheshwari.mp4

8.6 MB

039 POC - 2 Host Header Attack Discovered by Shubham Maheshwari.mp4

9.3 MB

040 POC - 3 Host Header Attack Discovered by Shubham Maheshwari.mp4

10.2 MB

041 POC -4 Host Header Attack Discovered by Shubham Maheshwari.mp4

11.3 MB

042 POC - 5 Host Header Attack Discovered by Shubham Maheshwari.mp4

11.9 MB

043 POC - 6 Host Header Attack Discovered by Shubham Maheshwari.mp4

14.7 MB

044 POC - 7 Host Header Attack Discovered by Shubham Maheshwari.mp4

9.7 MB

/06 URL Redirection/

045 Background Concept about URL Redirection.mp4

2.1 MB

045 URL-Redirection-Background.pdf

32.8 KB

046 URL Redirection Through Get Parameter.mp4

22.9 MB

046 URL-Redirection-Through-Get-Parameter.pdf

30.9 KB

047 URL Redirection Through Path Fragments.mp4

18.2 MB

048 POC of URL Redirection 1.mp4

343.9 KB

048 Screen-Shot-E8-03-22-at-09.56.19.png

51.9 KB

049 POC of URL Redirection 2.html

1.3 KB

050 POC 3 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4

5.9 MB

051 POC 4 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4

7.0 MB

052 POC 5 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4

10.5 MB

053 POC 6 Open Redirection Vulnerability Discovered by Dawood Ansar.mp4

17.9 MB

/07 Parameter Tampering/

054 Background Concept about Parameter Tampering.mp4

5.1 MB

054 Background-Parameter-Tampering.pdf

25.9 KB

055 Parameter Tampering - Example 1.mp4

7.7 MB

056 Parameter Tampering - Example 2.mp4

8.3 MB

057 Parameter Tampering - Example 3.mp4

7.1 MB

058 Parameter Tampering - Example 4.mp4

14.6 MB

059 Parameter Tampering - Example 5.mp4

12.9 MB

/08 HTML Injection/

060 Background Concept about HTML Injection.mp4

2.3 MB

060 Background-HTMLI.m4v

2.2 MB

061 HTML Injection Finding - Example1.mp4

7.0 MB

062 HTML Injection Finding - Example2.mp4

14.3 MB

063 HTML Injection Finding - Example3.mp4

13.0 MB

064 Exploitation of HTML Injection.html

2.5 KB

/09 File Inclusion/

065 Background Concept about File Inclusion.mp4

18.8 MB

065 File-incusion.txt

1.1 KB

066 LFI Vs RFI.mp4

43.3 MB

067 LFI Hunting Part 1.mp4

30.3 MB

068 LFI Hunting Part 2.mp4

50.7 MB

068 pathtotest-huge.txt

500.1 KB

069 Exploitation of LFI.mp4

32.9 MB

070 RFI Hunting.mp4

53.4 MB

/10 Missinginsufficient SPF record/

071 Background Concept about Missing insufficient SPF record.mp4

3.6 MB

071 Background-SPF.pdf

23.6 KB

072 Testing SPF.mp4

7.2 MB

072 Testing-SPF.pdf

20.1 KB

073 Exploitation of SPF.mp4

12.0 MB

074 POC 1 SPF.mp4

15.9 MB

075 POC 2 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4

15.0 MB

076 POC 3 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4

16.2 MB

077 POC 4 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4

19.3 MB

078 POC 5 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4

13.0 MB

/11 Insecure CORS Configuration/

079 Background Concept about CORS.mp4

4.6 MB

079 Background-Concept-Insecure-CORS.pdf

24.5 KB

080 Insecure CORS by Checking Response Header.mp4

13.7 MB

080 Insecure-CORS-Response-Header.pdf

23.5 KB

081 Insecure CORS through Request Header.mp4

17.9 MB

081 Insecure-CORS-Through-Request-Header.pdf

41.3 KB

082 Exploitation of Insecure CORS.mp4

29.5 MB

082 exploitation-cors.pdf

27.1 KB

083 POC Insecure CORS.html

1.0 KB

/12 Server Side Request Forgery/

084 Background Concept about SSRF.mp4

14.4 MB

085 SSRF Testing on Lab.mp4

116.2 MB

086 SSRF on Live web.mp4

54.7 MB

086 SSRF.pdf

36.8 KB

087 Exploitation of SSRF attack.mp4

107.6 MB

087 SSRF.pdf

36.8 KB

/13 Critical File Found/

088 Background Concept about Critical File Found.mp4

18.5 MB

089 Critical File Found on Live web 1.mp4

75.9 MB

089 dicc.txt

84.1 KB

090 Critical File Found on Live web 2.mp4

144.3 MB

090 Critical-File.pdf

23.6 KB

/14 Source Code Disclosure/

091 Background Concept about Source Code Disclosure.mp4

12.9 MB

092 Source Code Disclosure on Lab.mp4

44.6 MB

093 Source Code Disclosure on Live Web.mp4

24.3 MB

093 dicc.txt

84.1 KB

/15 Cross Site Request Forgery/

094 Background Concept about CSRF.mp4

26.6 MB

095 Injection Point for CSRF.mp4

13.3 MB

096 CSRF on Logout Page.mp4

22.1 MB

097 CSRF Live.mp4

34.6 MB

098 CSRF page on some critical Business Logic Page.mp4

53.2 MB

099 CSRF POC -1 Discovered by Ankit Singh.mp4

23.7 MB

100 CSRF POC 2 Discovered by Ankit Singh.mp4

27.6 MB

101 CSRF POC -3 Discovered by Ankit Singh.mp4

21.6 MB

/16 Hostile Subdomain Takeover/

102 Background Concept about Hostile Subdomain Takeover.mp4

54.4 MB

103 Hostile Subdomain Takeover on Live web 1.mp4

98.5 MB

103 Hostile.txt

1.0 KB

104 Hostile Subdomain Takeover on Live web 2.mp4

86.2 MB

/17 SQL Injection/

105 Background Concept about SQL injection.mp4

28.8 MB

106 SQL Injection Lab Setup.mp4

77.5 MB

107 Injection Point for SQL Injection.mp4

45.7 MB

108 Learn SQL Query Fixing.mp4

108.4 MB

108 SQLI.pdf

39.3 KB

109 SQLI GET Based Part 1.mp4

123.6 MB

110 SQLI GET Based Part 2.mp4

66.7 MB

111 SQLI GET Based Part 3.mp4

112.9 MB

112 Exploitation of GET Based SQLI.mp4

248.5 MB

112 sqli.txt

4.1 KB

113 SQLI POST Based Part 1.mp4

112.5 MB

114 SQLI POST Based Part 2.mp4

119.5 MB

115 Exploitation of POST Based SQLI.mp4

153.2 MB

115 sqli.txt

10.8 KB

116 SQLI Header Based.mp4

48.2 MB

117 Exploitation of Header Based SQLI.mp4

24.3 MB

118 SQLI Cookie Based.mp4

39.4 MB

119 Exploitation of Cookie Based SQLI.mp4

31.5 MB

120 WAF Bypassing for SQLI.mp4

94.5 MB

121 Authentication Bypassing through SQLI.mp4

60.7 MB

122 Automation of SQLI GET Based.mp4

184.2 MB

122 SQLI.pdf

39.3 KB

123 Automation of SQLI Post Based Header Based and Cookie Based.mp4

123.8 MB

124 Automation of SQLI Part 3 With WAF Bypassing.mp4

101.5 MB

125 SQLI on Live Web 1.mp4

50.5 MB

125 SQLI.pdf

39.3 KB

126 SQLI Live Bug Bounty Website.mp4

182.8 MB

127 SQL Injection Live Website.mp4

45.4 MB

/18 Command Injection/

128 Background Concept about Command Injection.mp4

5.2 MB

128 Background-CMDi.pdf

27.5 KB

129 Command Injection on Lab Part 1.mp4

10.1 MB

130 Command Injection on Live Web 1.mp4

11.9 MB

131 Command Injection on Live Web 2.mp4

6.4 MB

131 Delimeter-List.txt

0.1 KB

131 cmd.txt

5.0 KB

132 Exploitation of Command Injection.mp4

8.5 MB

132 exploitation-CMDI.pdf

31.6 KB

/19 File Uploading/

133 Background Concept about File Uploading.mp4

10.5 MB

133 File-Uploading.pdf

25.6 KB

134 File Uploading Part 1.mp4

77.0 MB

135 File Uploading Part 2.mp4

48.4 MB

136 File Uploading Part3.mp4

57.0 MB

137 File Uploading on Live Part 2.mp4

14.2 MB

/20 XML External Entity Injection/

138 Background Concept about XXE Injection.mp4

14.5 MB

138 XXE.pdf

23.2 KB

139 XXE on Lab.mp4

27.1 MB

139 xml-attacks.txt

12.5 KB

/21 Thank you/

140 Thank you message from Vikash Chaudhary.mp4

2.1 MB

/

[DesireCourse.Com].url

0.1 KB

 

Total files 179


Copyright © 2024 FileMood.com