Course Highlights
  • Learn Penetration Testing from scratch to become a bug bounty hunter and web security expert
  • Discover, exploit, and mitigate all types of web vulnerabilities. Secure any of your future applications using best practices
  • Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)
  • How to make money from Bug Bounty Hunting and make a career of it
  • Attacking Systems With Known Vulnerabilities
  • Website Enumeration & Information Gathering
  • Bug Hunter and the Burpsuite Tool
  • HTML Injections
  • Command Injection/Execution
  • Broken Authentication
  • Brutefroce Attacks
  • Broken Access Control
  • Security Misconfiguration
  • Cross Site Scripting - XSS
  • SQL Injection
  • XML, XPath Injection, XXE
  • Logging And Monitoring Best Practices
  • Web Fundamentals
  • Networking Fundamentals
  • Linux Terminal Fundamentals
Curriculum

8 Topics
Course Outline
Join Our Online Classroom!
Exercise: Meet Your Classmates and Instructor
What is Penetration Testing ?
What is Bug Bounty ?
Course Resources + Guide
ZTM Resources
Monthly Coding Challenges Free Resources and Guides

6 Topics
Virtual Box Kali Linux Download
Important - New Kali Linux Categories
Kali Linux Installation
OWASPBWA Installation
Creating TryHackMe Account
2 Paths

9 Topics
Website Enumeration - Theory
Google Dorks
Ping Host Nslookup ...
Whatweb
Dirb
Nmap
Nikto
Web Python Machine Learning Monthly + Resources
LinkedIn Endorsements

4 Topics
Burpsuite Configuration
Burpsuite Intercept
Burpsuite Repeater
Burpsuite Intruder

5 Topics
HTML Injection - Theory
HTML Injection 1 on TryHackMe
HTML Injection 2 - Injecting User-Agent Header
Injecting Cookie Field and Redirecting The Page
Advance Example of HTML Injection

5 Topics
Command Injection Theory
Command Injection On TryHackMe and Blind Command Injection
Solving Challenges With Command Injection
Running PHP Reverse Shell With Command Execution Vulnerability
Bypassing Input Filter And Executing Command

6 Topics
Broken Authentication Theory
Broken Authentication On TryHackMe
Broken Authentication Via Cookie
Basic Authorization in HTTP Request
Forgot Password Challenge
Session Fixation Challenge

4 Topics
Cluster Bomb Bruteforce
Hydra Bwapp Form Bruteforce
Hydra Post Request Form Bruteforce
Extra - Hydra SSH Attack

1 Topic
Sensitive Data Exposure Example

3 Topics
Broken Access Control - Theory
Accessing passwd With BAC
Ticket Price IDOR

2 Topics
Security Misconfiguration - Default App Credentials
Exercise: Imposter Syndrome

7 Topics
XSS Theory
Changing Page Content With XSS
Bypassing Simple Filter
Downloading a File With XSS Vulnerability
DOM XSS Password Generator
JSON XSS
Old Vulnerable Real Applications

6 Topics
SQL Injection Theory
Guide To Exploiting SQL Injection
Getting Entire Database
Extracting Passwords From Database
Bypassing Filter In SQL Query
Blind SQL Injection

3 Topics
XPath Injection
XPath Injection 2
XXE

1 Topic
Components With Known Vulnerabilities Example

1 Topic
Insufficient Logging And Monitoring Example

2 Topics
Whats Next & How To Earn Money By Finding Vulnerabilities ?
Unique and Interesting Bugs Discovered

16 Topics
Browsing the Web
Breaking Google
The Internet Backbone
Traceroute
HTML CSS Javascript
Build Your First Website
HTML Tags
Your First CSS
What Is Javascript?
Your First Javascript
Javascript On Our Webpage
HTTP/HTTPS
Introduction To Databases
SQL: Create Table
SQL: Insert Into + Select
What is PHP?

3 Topics
Linux 1 - ls cd pwd touch...
Linux 2 - sudo nano clear ...
Linux 3 - ifconfig nslookup host ...

1 Topic
Networking Cheatsheet

4 Topics
Thank You
Become An Alumni
Endorsements On LinkedIN
Learning Guideline

1 Topic
Special Bonus Lecture

  Write a Review

Web Security & Bug Bounty: Learn Penetration Testing

Go to Paid Course