H | BHE (Bug Hunting Expert)
Duration: 03 months
With our Bug Hunting Expert course, you can take an exciting trip into the world of cybersecurity and learn how to find and fix vulnerabilities that pose a threat to digital landscapes. As a Bug Hunter, you’ll get skilled at finding concealed flaws in systems and software and turning them into well-defended strongholds.
Module 01: Techniques for Testing Web Applications
Introduction to Web Application testing
OWASP Top 10
SANS Top 25 Vulnerabilities
Common Weakness Enumeration (CWE) Vulnerabilities
Bug Bounty Platforms Like bugcrowd and hackerone
Bug Hunting Penetration Testing Lab Setup
Module 02: Essential Reconnaissance Methods for Bug Hunters
Understanding Bug Bounty Programs
Manual Subdomain Identification and Analysis
Recon Automation using Bash Shell Scripting
Reconnaissance Techniques: Active and Passive
Recognizing Web Application Frameworks and Technologies
Offensive Approach to Hunt Bugs
Techniques for Identifying Sensitive Endpoints
Information Gathering Framework
Analysis of Sensitive and Hidden Directories in Web Application
Module 03: BurpSuite for Web Application Pentesters
Introduction to BurpSuite
Set up your Burp Suite environment and examine target websites using Burp 2x.
Scan web application, interpret our results and manual analysis
Simulate Hybrid Spidering your Web Application
Exploiting Vulnerabilities in your web application and integrate Burp and File Attacks
Perform customized attacks with an advanced toolkit for bug bounty hunters and penetration testers
Use of Intruder, Repeater and Decoder
Module 04 : Exploiting Traditional Web Application Vulnerabilities
Broken Authentication: Weak Login Function Issues
Bypass Single and Two Factor (2Fa) Authentication
OAuth Redirect_URI Issues
Disclosure of Confidential Information
Introduction to Session Managements
Web Authentication, Session Management, and Access Control
Session Hijacking and Fixation Attack
Session Management in HTTP
Client and Server Session management
Password Reset Token is Not Invalidated After Use
Password Reset Token Leakage via Referer
Password Reset Token Sent Over HTTP
Parameter Tampering
Module 05: Vulnerabilities in Access Control and Escalation of Privilege
Missing and Improper Authorization Issues
IDOR (Insecure Direct Object Reference)
Authorization Bypass Through User-Controlled Key
Unauthorized Access Via User Impersonation
Vertical and Horizontal privilege escalation
Access control vulnerabilities in multi-step processes
Vulnerabilities in Referer-based controls
Module 06: Injection Flaws on Web Applications
Introduction to injection Attacks
Finding All Possible Insertion Points
Injection Flaws: OS Command Injection
Injection Flaws: XSS (Cross Site Scripting)
Testing Injection Flaws for SQL Injection
Testing Injection Flaws for Host Header Injection
Testing Injection Flaws for CSV Injection
Testing Injection Flaws for Cookie Injection
Testing Injection Flaws for XXE Injection
Testing Injection Flaws for LDAP Injection
Testing Injection Flaws for IMAP SMTP Injection
Testing Injection Flaws for SSI Injection
Testing Injection Flaws for Server-Side Template Injection
Testing Injection Flaws for Code Injection : Remote Code Execution (RCE)
Module 07: Vulnerabilities of Modern Web Applications
Directory Traversal Attack
Remote File Inclusion
Unrestricted File Upload with Dangerous Type
Cross Site request Forgery (CSRF) : Account Takeover
Server Side Request Forgery (SSRF) : Sensitive Action
Rate Limiting Missing on Web Applications Functions
Module 08: Security Misconfiguration on Web Application
No Password Policy
Default account settings
Web application and cloud misconfiguration
Default Privileges Vulnerability
Improper Data Validation
Misconfigured logging
Deprecated protocols and encryption
Links
Contact Info
- +91 9920955055
- contact@hackanics.com
- Mumbai , Pune , Bangalore, Udaipur , Jaipur
Sign up for Newsletter
Hackanics copyright © 2024. All Rights Reserved.