Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bug Bounty Methodology

via YouTube

Overview

This course covers bug bounty methodology, including Google DORKs for content discovery, single target recon, using the Wayback machine for content discovery, note-taking, blind command injection testing, business logic flaws, XSS attacks, OS command injection, CSRF, WAF bypass techniques, and more. The course aims to teach students the skills needed to start bug bounty hunting through a combination of practical demonstrations and tips. The intended audience for this course includes beginners interested in bug bounty hunting and cybersecurity enthusiasts looking to enhance their skills in vulnerability testing and reporting.

Syllabus

Bug bounty methodology: Google DORKs for content discovery (recon 2/3).
Bug bounty methodology: Single target recon (1/3).
Bug bounty methodology: Wayback machine for content discovery (recon 3/3).
Bug Bounty Methodology: Recon in action.
Bug bounty bits: Note taking.
My own basic bounty methodology: Bug Bounty Bytes.
Full bug bounty methodology to help you get started.
How do i test for blind command injection? .
Full bug bounty methodology to get you started V 2.0 (Say cheese).
Today I Found An SSTI, But I Did Not Report it! .
OWASP Chandigarh: How to get started in bug bounties + business logic flaws.
Bug bounty starter checklist by KathanP19.
How To Get Started In Bug Bounties: Beginner Tips.
Broken Acces Control: What is it and how do you test for it.
Uncle Rats Ultimate SSRF Guide For Bug Bounties.
Uncle Rat's CSRF Bug Bounty Methodology Demonstrated.
The Anatomy Of An XSS Attack Vector.
Uncle Rats Ultimate Guide To Finding OS Command Injection.
CSRF Apprentice Tips And Tricks Demonstrated - PortSwigger labs.
Broad Scope Bug Bounty Methodology: Hunt Like A Rat.
Uncle Rat’s Top Tier Business Logic Busting Tips: The Fun In Flawed Logic.
What You NEED To Know About Bug Bounties.
How To Test For Reflected XSS.
Full Free Course: Android Bug Bounty Hunting.
Manual Broad Scope Bug Bounty Methodology.
WAF Bypass Techniques: Let's make some WAFfles.
Free Bug Bounty Live Class - 1: What Target Do I Pick And How Do I Hack It?.
Rat Reviews Bug Bounty Testing Strategies - Vol 2.

Taught by

The XSS rat

Reviews

Start your review of Bug Bounty Methodology

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.