Completed
IDOR on hidden functionality
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Bug Bounty 101
Automatically move to the next video in the Classroom when playback concludes
- 1 Bug bounty 101: CSRF can be easy
- 2 Bug bounties 101: SSTI on tornado template engine
- 3 Bug bounty 101: SSTI, playtime is over (server side template injection)
- 4 Bug Bounty Bits: find IDORs faster with automation (Insecure Direct Object Reference tutorial)
- 5 Bug bounties 101: The #1 skill every bounty hunter should have
- 6 Hacking 101: single domain webapp recon with nmap, nikto and gobuster - #1
- 7 Bug bounty's 101: What you need to know before hacking
- 8 Bug bounty's 101: Picking a platform
- 9 Bug bounty bits: File extension filter bypass technique
- 10 Bug Bounties 101: how much can I earn?
- 11 Bug bounty methodology: Google DORKs for content discovery (recon 2/3)
- 12 Bug bounty bits: Chrome developer console is gold!
- 13 Bug bounty 101: whats an API and why should I care?
- 14 Bug Bounty Bits: Importing H1 scope into burp (HackerOne)
- 15 LFI: Bug Bounty Bits
- 16 The number 1 reason you are getting so many dupes in bug bounties
- 17 How to get invited to private bug bounty programs
- 18 How do i get private invites and bugs: YQA (Your Questions Answered)
- 19 What you NEED to know about XSS explained by 0xLupin
- 20 IDOR on hidden functionality