Course curriculum

  • 01

    Section 1: The intricacies of bug bounties

    • 2. Introduction

  • 02

    Section 2: The intricacies of bug bounties

    • 3. The Intricacies of bug bounties

  • 03

    Section 3: Broad Scope Methodology

    • 4. Broad scope methodology - Manual

    • 5. Broad scope methodology - Automated

  • 04

    Section 4: Processing Subdomains

    • 6. Subdomain enumeration

  • 05

    Section 5: 3 Subdomain flyover

    • 7. 3 Subdomain flyover

  • 06

    Section 6: 4 Exploiting Open Ports

    • 8. 4 Exploiting open ports

  • 07

    Section 7: A Vulnerability Scanning

    • 9. A Vulnerability scanning

  • 08

    Section 8: B Our Attack Strategy

    • 10. B Our attack strategy

  • 09

    Section 9: 97 Exploit-db Examples

    • 11. 97 Exploit-db examples

  • 10

    Section 10: Cheat Sheets and Extras

    • 12. Cheat Sheets

    • 13. Analysing javascript files

    • 14. What the ffuf

    • 15. Directory brute forcing

    • 16. You are probably doing directory brute forcing wrong. Here's why!

    • 17. Subdomain flyover

    • 18. Running scripts on a VPS