- Introduction 3
- Course IntroductionLecture1.103 min
 - Introduction to Bug HuntingLecture1.2
 - What is a Website?Lecture1.305 min
 
 - Information Disclosure vulnerabilities 8
- Introduction to Information Disclosure VulnerabilitiesLecture2.1
 - Discovering Database Login CredentialsLecture2.209 min
 - Discovering Endpoints & Sensitive DataLecture2.308 min
 - Introduction to HTTP Status CodesLecture2.408 min
 - Employing the Hacker / Bug Hunter Mentality to Discover Admin Login InformationLecture2.508 min
 - Manipulating Application Behaviour Through the HTTP GET MethodLecture2.606 min
 - Manipulating Application Behaviour Through the HTTP POST MethodLecture2.707 min
 - Intercepting Requests With Brup ProxyLecture2.810 min
 
 - Broken Access Control Vulnerabilities 6
- Introduction to Broken Access Control VulnerabilitiesLecture3.1
 - Cookie ManipulationLecture3.2
 - Accessing Private User DataLecture3.307 min
 - Discovering IDOR Vulnerabilities (Insecure Direct Object Reference)Lecture3.409 min
 - Privilege Escalation with Burp RepeaterLecture3.510 min
 - Debugging Flows with HTTP TRACE & Gaining Admin Access!Lecture3.608 min
 
 - Path / Directory Traversal 7
- Introduction to Path Traversal Vulnerabilities & Basic DiscoveryLecture4.109 min
 - Bypassing Absolute Path RestrictionLecture4.205 min
 - Bypassing Hard-coded ExtensionsLecture4.304 min
 - Bypassing FilteringLecture4.404 min
 - Bypassing Hard-coded PathsLecture4.504 min
 - Bypassing Advanced FilteringLecture4.606 min
 - Bypassing Extreme FilteringLecture4.709 min
 
 - CSRF - Cross-Site Request Forgery 1
- Discovering & Exploiting CSRF VulnerabilitiesLecture5.109 min
 
 - OAUTH 2.0 Vulnerabilities 4
- Introduction to OAUTH 2.0Lecture6.1
 - OAUTH 2.0 Basic ExploitationLecture6.210 min
 - Exploiting a Linking OAUTH 2.0 Flow Through CSRFLecture6.312 min
 - Exploiting a Login OAUTH 2.0 Flow Through CSRFLecture6.413 min
 
 - Injection Vulnerabilities 1
- Introduction to Injection VulnerabilitiesLecture7.1
 
 - OS Command Injection 4
- Discovering a Basic Command Injection VulnerabilityLecture8.108 min
 - Discovering Blind Command Injection VulnerabilitiesLecture8.209 min
 - Discovering Asynchronous Blind Command Injection VulnerabilitiesLecture8.308 min
 - Using Burp Collaborator to Exploit Asynchronous Blind Command InjectionLecture8.405 min
 
 - XSS - Cross Site Scripting 3
- Introduction to XSS Vulnerabilities & Its TypesLecture9.104 min
 - Discovering a HTML Injection VulnerabilityLecture9.205 min
 - Discovering Reflected & Stored XSS VulnerabilitiesLecture9.305 min
 
 - DOM XSS Vulnerabilities 6
- Introduction to DOM XSS VulnerabilitiesLecture10.105 min
 - Discovering a Reflected DOM XSS in a LinkLecture10.206 min
 - Discovering a Reflected XSS in an Image Tag!Lecture10.306 min
 - Injecting Javascript Directly in a Page ScriptLecture10.406 min
 - Discovering XSS in a Drop-down MenuLecture10.504 min
 - Discovering XSS in AngularJS ApplicationLecture10.604 min
 
 - XSS - Bypassing Security 5
- Bypassing Basic FilteringLecture11.106 min
 - Bypassing Single-Quotes FilteringLecture11.2
 - Bypassing Advanced FilteringLecture11.310 min
 - Bypassing Server-Side FilteringLecture11.407 min
 - Bypassing Extreme Filtering with Burp IntruderLecture11.509 min
 
 - Bypassing Content Security Policy (CSP) 2
- Analysing the Target ApplicationLecture12.106 min
 - Discovering an XSS in a CSP Enabled ApplicationLecture12.208 min
 
 - SQL Injection Vulnerabilities 5
- Introduction to SQL Injection VulnerabilitiesLecture13.107 min
 - Discovering SQL InjectionsLecture13.207 min
 - Bypassing Admin Login Using Logical OperatorsLecture13.305 min
 - Selecting Data From the DatabaseLecture13.408 min
 - Accessing The Database Admin RecordsLecture13.507 min
 
 - Blind SQL Injections 4
- Discovering Blind SQL InjectionsLecture14.106 min
 - Enumerating Table & Column NamesLecture14.210 min
 - Recovering Administrator Password With Burp IntruderLecture14.308 min
 - Using the Cluster-Bomb Attack to Recover PasswordsLecture14.408 min
 
 - Time-Based Blind SQL Injection 3
- Discovering Time-Based Blind SQLiLecture15.108 min
 - Extracting Data From the Database Using a Time-Based Blind SQLiLecture15.211 min
 - Getting The Admin Password Using a Time-Based Blind SQLiLecture15.3
 
 - SSRF (Server-Side Request Forgery) 4
- Introduction to SSRF VulnerabilitiesLecture16.1
 - Theory Behind SSRF Vulnerabilities & Their ImpactLecture16.207 min
 - Discovering a Basic SSRF VulnerabilityLecture16.305 min
 - Accessing Private (Admin) Resources Using an SSRF VulnerabilityLecture16.406 min
 
 - SSRF - Advanced Exploitation 2
- Advanced SSRF DiscoveryLecture17.106 min
 - Scanning & Mapping Internal Network & ServicesLecture17.208 min
 
 - SSRF - Bypassing Security 3
- Bypassing BlacklistsLecture18.108 min
 - Bypassing WhitelistsLecture18.210 min
 - Chaining Open Redirection with SSRF to Bypass Restrictive FiltersLecture18.307 min
 
 - Blind SSRF Vulnerabilities 4
- Introduction to Blind SSRF VulnerabilitiesLecture19.1
 - Discovering Blind SSRF VulnerabilitiesLecture19.206 min
 - Exploiting Blind SSRF VulnerabilitiesLecture19.308 min
 - Escalating Blind SSRF to a Remote Code Execution (RCE)Lecture19.408 min
 
 - XXE (XML External Entity) Injection 4
- Introduction to XXE Injection VulnerabilitiesLecture20.1
 - What is XML?Lecture20.203 min
 - Exploiting a Basic XXE InjectionLecture20.309 min
 - Discovering an SSRF Through a Blind XXELecture20.407 min
 
 - 2 Hour Live Bug Hunting ! 14
- 2 Hour Live Bug Hunt IntroductionLecture21.1
 - Overview of the TargetLecture21.209 min
 - Discovering an Open Redirect VulnerabilityLecture21.307 min
 - Discovering an XSS in the ResponseLecture21.409 min
 - Discovering an XSS in a HTML CommentLecture21.509 min
 - Discovering an XSS in a Date PickerLecture21.606 min
 - Broken Access Control in Booking PageLecture21.706 min
 - Analysing Application Files & Finding Sensitive DataLecture21.812 min
 - Discovering Endpoints Hidden In CodeLecture21.904 min
 - Discovering an IDOR – Insecure Direct Object ReferenceLecture21.1004 min
 - Discovering Hidden Endpoints Using RegexLecture21.1109 min
 - Discovering a Complex Stored XSSLecture21.1211 min
 - Discovering Bugs in Hidden ElementsLecture21.1308 min
 - Discovering Bugs in Hidden ParametersLecture21.1407 min
 
 - Participating in Bug Bounty Programs 3
- Hacker1 OverviewLecture22.110 min
 - Bug-Bounty OverviewLecture22.206 min
 - Submitting a Bug ReportLecture22.308 min
 
 - Bonus Section 1
- Bonus Lecture – Want to learn more?Lecture23.103 min
 
 
This content is protected, please login and enroll course to view this content!
