17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
• How to identify and distinguish different types of bugs.
• Finding bugs in real-world websites.
• To create a bug report with its complete description.
• Methods of earning through bug documentation on the websites.
• Rewards you can get from Bug Hunting on a website.
• Live POCs of websites.
Requirements:
• A laptop with a strong internet connection.
• Basic knowledge of web technologies.
• Basic computer and Internet browsing knowledge.
Description:
This Bug Bounty Hunting program includes all the methods to find any vulnerability in websites/ web applications and their exploitation and is designed to inform all the latest vulnerabilities on websites like CSRF attacks, Web Application attacks, Injection attacks, and many more. You will also learn the procedure in which you get paid or earn many other rewards by documenting and disclosing these bugs to the website’s security team. So, this course will give you a precise introduction to the bugs that you can report and earn money.
Who this course is for:
• Anyone who wants to earn from Bug Hunting.
Instructor:
Paratosh Kumar, Paratosh Bansal has an excellent grip on VAPT of Web apps, Mobile apps, Servers, IoT enabled devices, AI/ML-based applications and Network Infrastructure. He has wide domain experience of working with companies in healthcare, telecommunications, FinTech, E-Commerce, Smart Devices, and IT Infrastructure Companies. He has helped companies like Airtel, PVR Cinemas, Max Life Insurance, Citrus Payment Gateway with the security of their IT assets. He also follows his passion to train the youth and has trained over 10,000+ students and working professionals as well.
1.Introduction to Bug Bounty/2645912-01 - What is a Bug Bounty Program - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
9.5 MB
1.Introduction to Bug Bounty/2645912-02 - Popular Bug Bounty Platforms - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
8.8 MB
1.Introduction to Bug Bounty/2645912-03 - BugCrowd - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
24.7 MB
1.Introduction to Bug Bounty/2645912-04 - HackerOne - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
10.7 MB
1.Introduction to Bug Bounty/2645912-05 - Benefits of Bug Bounty - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
9.4 MB
1.Introduction to Bug Bounty/2645912-06 - Brief About Common Vulnerabilities - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
9.8 MB
1.Introduction to Bug Bounty/2645912-07 - Hacking Terminologies - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
24 MB
10.Brute Forcing/2645912-55 - Brief About Brute Force - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
17.3 MB
10.Brute Forcing/2645912-56 - Brute Force DVWA - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
22.8 MB
10.Brute Forcing/2645912-57 - Live OTP Brute Force POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
21.8 MB
11.Security Misconfigurations_ Exploiting Web Apps/2645912-58 - Security Misconfigurations _ Improper Handling - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
33.1 MB
11.Security Misconfigurations_ Exploiting Web Apps/2645912-59 - Guessing Weak Passwords - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
36.1 MB
11.Security Misconfigurations_ Exploiting Web Apps/2645912-60 - Live SPF Record Missing POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
5 MB
12.Insecure CORS/2645912-61 - 12.1 Concept About Insecure CORS (Voice Issue) Completed - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
25.4 MB
13.File Inclusion Vulnerability/2645912-62 - Remote File Inclusion - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
10 MB
13.File Inclusion Vulnerability/2645912-63 - Local File Inclusion - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
14.5 MB
13.File Inclusion Vulnerability/2645912-64 - File Inclusion (DVWA) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
21.5 MB
13.File Inclusion Vulnerability/2645912-65 - Live LFI POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
23.5 MB
14.Server-Side Request Forgery/2645912-66 - What is SSRF - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
25.5 MB
15.Insecure Captcha/2645912-67 - Brief About Insecure Captcha - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
16.6 MB
15.Insecure Captcha/2645912-68 - Live Captcha Bypass POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
17.7 MB
16.Automating VAPT _ Advanced Information Gathering/2645912-69 - Introduction to Automated VAPT _ Advance Level Information Gathering - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
40 MB
17.Documenting _ Reporting Vulnerability/2645912-70 - Introduction to VAPT Reporting - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
56.3 MB
18. Conclusion of Bug Bounty/2645912-71 - Conclusion of Bug Bounty - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
6.4 MB
2.Information Gathering/2645912-08 - What is Information Gathering - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
12.8 MB
2.Information Gathering/2645912-09 - Concept of Digital Footprinting - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
5.3 MB
2.Information Gathering/2645912-10 - What Information to Gather - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
10.3 MB
2.Information Gathering/2645912-11 - What is Whois Information - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
27.8 MB
2.Information Gathering/2645912-12 - Information Gathering About People _ Organisation - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
42.2 MB
2.Information Gathering/2645912-13 - Gathering Information About Websites - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
50.1 MB
2.Information Gathering/2645912-14 - Google Dorking _ GHDB - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
46.6 MB
3.Setting Up Labs/2645912-15 - DVWA Introduction _ Configuration - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
30.2 MB
3.Setting Up Labs/2645912-16 - bWAPP Introduction _ Configuration - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
19.8 MB
4.Introduction to Burp Suite/2645912-17 - Introduction to Burp Suite - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
31.1 MB
4.Introduction to Burp Suite/2645912-18 - Steps to Configure - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
18.8 MB
5.SQL Injection/2645912-19 - Introduction to SQL - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
8.9 MB
5.SQL Injection/2645912-20 - Writing Basic SQL Query - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
24.7 MB
5.SQL Injection/2645912-21 - Different Types of Comments Used in SQL - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
10.4 MB
5.SQL Injection/2645912-22 - SQLi Introduction _ Impact - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
21.7 MB
5.SQL Injection/2645912-23 - Union Based SQLi - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
91.4 MB
5.SQL Injection/2645912-24 - Boolean Based SQLi - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
36.6 MB
5.SQL Injection/2645912-25 - Time based SQLi - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
22.7 MB
5.SQL Injection/2645912-26 - Validation Bypass (Client and Server) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
27 MB
5.SQL Injection/2645912-27 - IDOR Vulnerability - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
20.4 MB
6.Web Application Attacks/2645912-28 - IDOR (BWAPP) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
22.2 MB
6.Web Application Attacks/2645912-29 - Rate Limiting Flaw - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
32 MB
6.Web Application Attacks/2645912-30 - File Upload Vulnerability - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
12.9 MB
6.Web Application Attacks/2645912-31 - File Upload on DVWA - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
24.9 MB
6.Web Application Attacks/2645912-32 - Live IDOR POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
26.6 MB
6.Web Application Attacks/2645912-33 - Live Rate Limiting Flaw POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
16.1 MB
7.Cross Site Script (XSS)/2645912-34 - What Is Cross Site Scripting(XSS) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
20.6 MB
7.Cross Site Script (XSS)/2645912-35 - Stored XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
13.1 MB
7.Cross Site Script (XSS)/2645912-36 - Stored XSS (DVWA) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
30.2 MB
7.Cross Site Script (XSS)/2645912-37 - Reflected XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
13.4 MB
7.Cross Site Script (XSS)/2645912-38 - Reflected XSS (DVWA) - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
27.1 MB
7.Cross Site Script (XSS)/2645912-39 - DOM Based XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
18 MB
7.Cross Site Script (XSS)/2645912-40 - Blind XSS - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4
12.4 MB
7.Cross Site Script (XSS)/2645912-41 - Live XSS POC - Bug Bounty Hunting Guide to an Advanced Earning Method.mp4