Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bugbounty Hunting

via YouTube

Overview

This course provides an introduction to the art of ethical hacking. Through a combination of lectures, demonstrations, and hands-on exercises, learners will develop skills in the areas of subdomain hunting, vulnerability scanning, exploiting CSRF vulnerability and bruteforce attacks, directory/file hunting, exploiting web application flaws, password cracking, Google hacking, VPN configuration, reconnaissance, post exploitation, and bug hunting. Students will also be exposed to the latest hacking tools like Hping3, Sn1per, and P0wny Shell and implement real-world attack scenarios. At the end of the course, learners will be able to identify and exploit various types of vulnerabilities, gain unauthorized access to a web application, and understand the latest best practices for defending against these types of attacks.

Syllabus

Subdomain hunting!.
Learn hacking with Hackthissite!.
Best Vulnerability scanners for Kali Linux(and Parrot os)!.
Gathering Email addresses of a particular domain!.
Exploiting CSRF vulnerability!(Account takeover).
Perform Bruteforce attack using Burpsuite!.
Directory and File hunting!.
Directory and File hunting!.
My Udemy course!.
NMAP Tutorial.
Create password wordlists like a pro!!.
Hydra tutorial.
Web parameter tampering attack explained! - [For educational purpose].
Install Kali Linux on Windows 10 | Windows Subsystem for Linux(WSL2).
Best hacking Operating System??.
Best PC or Laptop configuration for Cybersecurity/Bugbounty.
Reflected XSS || Live demo.
Google hacking.
Top 10 Hacking tools.
Virtual Private Network || Best VPN's.
GitHub Recon.
How to view Android application source code??.
Let's Discuss about Passwords!.
Basic recon on Websites/Webservers.
P0wny Shell || Best PHP reverse shell.
Hping3 Tutorial.
Broken Access Control Vulnerability.
Bypassing OTP.
Bypassing OTP || Part-2.
Post Exploitation File Transfers || Penetration Testing.
How I was able to view sensitive details of other users || Bugbounty POC.
How to get started with Bug Bounty hunting??.
Steal cookies by exploiting stored XSS.
Web Application Firewall detection techniques.
Sn1per || An Automated Pentesting Framework.

Taught by

Sathvik Techtuber

Reviews

4.0 rating, based on 2 Class Central reviews

Start your review of Bugbounty Hunting

  • Profile image for Prince Kumar
    Prince Kumar
    The course was well-structured, covering essential aspects of hunting, safety protocols, and practical skills. The instructor demonstrated extensive knowledge and ensured a participative and engaging environment. I found the overall experience enriching and highly recommend the course.
  • Moussouni Abdelkader
    I find it really helpful and it's very clear and I wish if you could do more courses about bug bounty hunter

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.