Skip to content
logo logo
  • Home
  • About Us
  • Courses
  • Gallery
  • Blog
  • Services
  • Contact Us
Whatsapp

H |…

  • Home
  • Course
  • H | Bug Hunting Expert (H | BHE)

H | BHE (Bug Hunting Expert)

With our Bug Hunting course, you can take an exciting trip into the world of cybersecurity and learn how to find and fix vulnerabilities that pose a threat to digital landscapes. As a Bug Hunter, you’ll get skilled at finding concealed flaws in systems and software and turning them into well-defended strongholds.
Duration: 03 months

With our Bug Hunting Expert course, you can take an exciting trip into the world of cybersecurity and learn how to find and fix vulnerabilities that pose a threat to digital landscapes. As a Bug Hunter, you’ll get skilled at finding concealed flaws in systems and software and turning them into well-defended strongholds.

Module 01: Techniques for Testing Web Applications
  1. Introduction to Web Application testing

  2. OWASP Top 10

  3. SANS Top 25 Vulnerabilities

  4. Common Weakness Enumeration (CWE) Vulnerabilities

  5. Bug Bounty Platforms Like bugcrowd and hackerone

  6. Bug Hunting Penetration Testing Lab Setup

Module 02: Essential Reconnaissance Methods for Bug Hunters
  1. Understanding Bug Bounty Programs

  2. Manual Subdomain Identification and Analysis

  3. Recon Automation using Bash Shell Scripting

  4. Reconnaissance Techniques: Active and Passive

  5. Recognizing Web Application Frameworks and Technologies

  6. Offensive Approach to Hunt Bugs

  7. Techniques for Identifying Sensitive Endpoints

  8. Information Gathering Framework

  9. Analysis of Sensitive and Hidden Directories in Web Application

Module 03: BurpSuite for Web Application Pentesters
  1. Introduction to BurpSuite

  2. Set up your Burp Suite environment and examine target websites using Burp 2x.

  3. Scan web application, interpret our results and manual analysis

  4. Simulate Hybrid Spidering your Web Application

  5. Exploiting Vulnerabilities in your web application and integrate Burp and File Attacks

  6. Perform customized attacks with an advanced toolkit for bug bounty hunters and penetration testers

  7. Use of Intruder, Repeater and Decoder

Module 04 : Exploiting Traditional Web Application Vulnerabilities
  1. Broken Authentication: Weak Login Function Issues

  2. Bypass Single and Two Factor (2Fa) Authentication

  3. OAuth Redirect_URI Issues

  4. Disclosure of Confidential Information

  5. Introduction to Session Managements

  6. Web Authentication, Session Management, and Access Control

  7. Session Hijacking and Fixation Attack

  8. Session Management in HTTP

  9. Client and Server Session management

  10. Password Reset Token is Not Invalidated After Use

  11. Password Reset Token Leakage via Referer

  12. Password Reset Token Sent Over HTTP

  13. Parameter Tampering

Module 05: Vulnerabilities in Access Control and Escalation of Privilege
  1. Missing and Improper Authorization Issues

  2. IDOR (Insecure Direct Object Reference)

  3. Authorization Bypass Through User-Controlled Key

  4. Unauthorized Access Via User Impersonation

  5. Vertical and Horizontal privilege escalation

  6. Access control vulnerabilities in multi-step processes

  7. Vulnerabilities in Referer-based controls

Module 06: Injection Flaws on Web Applications
  1. Introduction to injection Attacks

  2. Finding All Possible Insertion Points

  3. Injection Flaws: OS Command Injection

  4. Injection Flaws: XSS (Cross Site Scripting)

  5. Testing Injection Flaws for SQL Injection

  6. Testing Injection Flaws for Host Header Injection

  7. Testing Injection Flaws for CSV Injection

  8. Testing Injection Flaws for Cookie Injection

  9. Testing Injection Flaws for XXE Injection

  10. Testing Injection Flaws for LDAP Injection

  11. Testing Injection Flaws for IMAP SMTP Injection

  12. Testing Injection Flaws for SSI Injection

  13. Testing Injection Flaws for Server-Side Template Injection

  14. Testing Injection Flaws for Code Injection : Remote Code Execution (RCE)

Module 07: Vulnerabilities of Modern Web Applications
  1. Directory Traversal Attack

  2. Remote File Inclusion

  3. Unrestricted File Upload with Dangerous Type

  4. Cross Site request Forgery (CSRF) : Account Takeover

  5. Server Side Request Forgery (SSRF) : Sensitive Action

  6. Rate Limiting Missing on Web Applications Functions

Module 08: Security Misconfiguration on Web Application
  1. No Password Policy

  2. Default account settings

  3. Web application and cloud misconfiguration

  4. Default Privileges Vulnerability

  5. Improper Data Validation

  6. Misconfigured logging

  7. Deprecated protocols and encryption

“Hackanics provides industry-leading certifications, courses, and professional expertise to help you achieve the tech career you deserve.”

Links

  • About us
  • Services
  • Courses
  • Blog
  • Contact us

Contact Info

  • +91 9920955055
  • contact@hackanics.com
  • Mumbai , Pune , Bangalore, Udaipur , Jaipur

Sign up for Newsletter

X-twitter Linkedin Instagram Youtube Facebook

Hackanics copyright © 2024. All Rights Reserved.

Copyright © Whizcyber 2024. All rights reserved