Completed
- File Inclusion Challenge Walkthrough
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Practical Bug Bounty - Web Application Security and Penetration Testing
Automatically move to the next video in the Classroom when playback concludes
- 1 - Intro
- 2 - Keeper Security Sponsorship
- 3 - Course Introduction
- 4 - Importance of Web App Security
- 5 - Web App Security Standards and Best Practices
- 6 - Bug Bounty Hunting vs Penetration Testing
- 7 - Phases of a Web App Pentest
- 8 - CryptoCat Introduction
- 9 - Understanding Scope, Ethics, Code of Conduct, etc.
- 10 - Common Scoping Mistakes
- 11 - Installing VMWare / VirtualBox
- 12 - Installing Linux
- 13 - Lab Installation
- 14 - Web Technologies
- 15 - HTTP & DNS
- 16 - Fingerprinting Web Technologies
- 17 - Directory Enumeration and Brute Forcing
- 18 - Subdomain Enumeration
- 19 - Burp Suite Overview
- 20 - Introduction to Authentication
- 21 - Brute-force Attacks
- 22 - Attacking MFA
- 23 - Authentication Challenge Walkthrough
- 24 - Intro to Authorization
- 25 - IDOR - Insecure Direct Object Reference
- 26 - Introduction to APIs
- 27 - Broken Access Control
- 28 - Testing with Autorize
- 29 - Introduction to LFI/RFI
- 30 - Local File Inclusion Attacks
- 31 - Remote File Inclusion Attacks
- 32 - File Inclusion Challenge Walkthrough
- 33 - Conclusion