Bug Bounty Hunting & Penetration Testing.
LIVE ATTACKS & DEFENCE TO MAKE YOU INDUSTRY READY
Below checkout is only for Indian Students.
Students outside India can pay via Paypal from above Buy $2 Button or at checkout page.
Pay with UPI, Credit & Debit Card
NOTE : You will not see the course onto the dashboard instantly. Enrolment process will take up to 2 hrs from the purchase time.
If you are not able to access after 24 hrs of purchase please write us at [email protected] attaching your transaction id or reach out to us on WhatsApp for instant support +91-8160206309 / +91 9106147779
Course Introduction
Disclaimer
Rules for asking Questions
How to Download a Certificate
What is OWASP and Injection
What is Broken Authentication
What is Sensitive Data Exposure
What is XML External Entities
What is Broken Access Control
What is Security Misconfiguration
What is Cross Site Scripting (XSS)
What is Insecure Deserialization
What is Using Components with Known Vulnerabilities
What is Insufficient Logging and Monitoring
Revision of OWASP
Burp Suite Proxy Lab Setup
Burpsuite Setup Revision
Authentication Bypass Exploitation Live -1
Authentication Bypass Exploitation Live -2
Authentication Bypass Exploitation Live -3
Authentication Bypass Exploitation Live -4
Authentication Bypass Exploitation Live -5
Authentication Bypass Exploitation Captcha
Authentication Bypass to Account Takeover Live -1
Authentication Bypass to Account Takeover Live -2
Authentication Bypass due to OTP Exposure Live -1
Authentication Bypass due to OTP Exposure Live -2
Authentication Bypass 2FA Bypass Live
Authentication Bypass - Email Takeover Live
Authentication Bypass Mitigations
Authentication Bypass Interview Questions and Answers
Authentication Bypass Revision
No Rate-Limit leads to Account Takeover Live Type-1
NO RL Alternative Tools Introduction
No Rate-Limit leads to Account Takeover Live Type -2
No Rate-Limit leads to Account Takeover Live Type -3
No Rate-Limit leads to Account Takeover Live Type -4
No Rate-Limit leads to Account Takeover Live Type -5
No Rate-Limit to Account Takeover Live - Type 6
No Rate-Limit to Account Takeover Live - Type 7
No Rate-Limit Instagram Report Breakdown
No Rate-Limit Instagram Report Breakdown 2
No Rate Limit Bypass Report Breakdown
No Rate Limit Bypass Report Breakdown 2
No Rate-Limit to Tool Fake IP Practical
No Rate-Limit test on CloudFare
No Rate-Limit Mitigations
No Rate-Limit All Hackerone Reports Breakdown
Burp Alternative : OWASP ZAP Proxy for No RL
No Rate-Limit Revision
How XSS Works
Reflected XSS on Live 1
Reflected XSS on Live 2
Reflected XSS on Live 3 Balanced
XSS on Limited Inputs Live 1
Reflected XSS on Live Manual Balancing
XSS on Limited Inputs Live 2
XSS in Request Headers - Live
Reflected XSS Useragent and Caching
Reflected XSS Email Validator Live
Reflected XSS Protection Bypass Live 1 - Base64
Reflected XSS Protection Bypass Live -2
XSS using Spider
XSS Bypass Right Click Disabled
Blind XSS Exploitation
Stored XSS Exploitation Live
DOM XSS Name
DOM XSS Redirect
DOM XSS Index
DOM XSS Automated Scanner
XSS on Live by Adding Parameters
XSS Mouse on Lab
XSS Mouse Live
XSS Mouse Events All Types
XSS Polyglots Live
XSS Polyglots Breakdown
XSS Exploitation - URL Redirection
XSS Exploitation - Phishing
XSS Exploitation Cookie Stealer Lab
XSS Exploitation Cookie Stealer Live
XSS Exploitation File Upload Type -2
XSS Exploitation File Upload Type -3
XSS Exploitation File Upload Type- 1
XSS Mitigations
XSS Bonus TIPS and TRICKS
XSS Hackerone ALL Reports Breakdown
XSS Interview Questions and Answers
XSS Revision
XSS Revision - 2
How CSRF Works
CSRF Alternative Tools Introduction
CSRF on LAB
CSRF on LAB - 2
CSRF on Live -1
CSRF on Live -2
CSRF Password Change Lab
CSRF Funds Transfer Lab
CSRF Request Methods Trick - Lab
CSRF to Account Takeover Live -1
CSRF to Account Takeover Live -2
Chaining CSRF with XSS
CSRF Mitigations
CSRF BONUS Tips and Tricks
CSRF ALL Hackerone Reports Breakdown
CSRF Interview Questions and Answers
Alternative to Burpsuite for CSRF : CSRF PoC Generator
How CORS Works
CORS 3 Test Cases Fundamentals
CORS Exploitation Live -2 Exfiltration of Account Details
CORS Exploitation Live -3 Exfiltration of Account Details
CORS Live Exploitation -4
CORS Exploitation Facebook Live
CORS Live Prefix Match
CORS Live Suffix Match
CORS Mitigations
CORS Breakdown of ALL Hackerone Reports
BugCrowd ROADMAP
Hackerone ROADMAP
Open Bug Bounty ROADMAP
NCIIPC Govt of India ROADMAP
RVDP All Websites ROADMAP
Reporting Templates
Exploitation
Assets & Resources
Final Words
Exploitation of CVE 2020-3452 File Read
Exploitation of CVE 2020-3187 File Delete
Ethical Hacking_Bug Bounty
Snapshot to XSS
Snapshot to CSRF
A1- Broken Access Control
Tips and Best Practices for IDOR
Rohit Gautam
Shifa Cyclewala
Frequently asked questions
You will have access for 365 Days
Yes, we have curated the course content with live simulations of practicals which is 100% inclined practicals with industry standards.
Yes, most of our students who have enrolled the course has been successful and have been acknowledged with many HoF, Bounties, Internships & Jobs. Don't take our words check our Linkedin Handle for student reviews and their acknowledgements - linkedin.com/in/shifa