About Bug Bounty Program, Participation Eligibility, Procedure followed, Hacking Phases, Vulnerability Assesment,
What is Bug Bounty
What is Penetration Testing
Introduction, Its type, Advantage,
What is Red Teaming What is SOC
Needs to be a Professional Bug Hunter
Setting up Hacking MachineIntroduction to Linux Environment
Introduction to NetworkingWeb Application Fundamentals & Configurations
HTTP and HTTPS Protocol
HTTP Requests & HTTP Response
URL & URI
HTTP Methods
HTTP Response Status Codes
SOP & CORS
Introduction to Web Application Security Testing
Types of Web Application Security Testing
Approach for Web App Penetration Testing
Basic of Bughunting
Web Penetration testing,
Network Penetration Testing
Cloud Penetration testing
Bughunting Platform
Bughunting Techniques
Bughunting Procedures
Tools Details usedExploiting Traditional Web Application Vulnerabilities
Sub Domain Take Over o Click Jacking
Checking Necessary Security Headers
Checking SPF & DMARC Record
CORS (Cross-Origin Resource Sharing)
Testing Rate Limit
Exploiting Reflected XSS
Logic behind SQL injection
OS Command injection
Security Administation ( Vulnerablity finding and its mitigation)