Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bugbounty Hunting

via YouTube

Overview

Embark on a comprehensive 7-hour journey into the world of bug bounty hunting. Master essential techniques including subdomain enumeration, email gathering, vulnerability scanning, and exploitation of common web vulnerabilities like CSRF and XSS. Dive deep into tools such as Burp Suite, NMAP, and Hydra, while exploring critical topics like password security, web parameter tampering, and Google hacking. Learn to set up hacking environments using Kali Linux and Windows Subsystem for Linux, and discover the best hardware configurations for cybersecurity work. Gain practical experience with live demonstrations, understand the importance of VPNs, and explore post-exploitation techniques. By the end, you'll be equipped with the knowledge to start your own bug bounty hunting career, including how to bypass OTPs, detect Web Application Firewalls, and use automated pentesting frameworks like Sn1per.

Syllabus

Subdomain hunting!.
Learn hacking with Hackthissite!.
Best Vulnerability scanners for Kali Linux(and Parrot os)!.
Gathering Email addresses of a particular domain!.
Exploiting CSRF vulnerability!(Account takeover).
Perform Bruteforce attack using Burpsuite!.
Directory and File hunting!.
Directory and File hunting!.
My Udemy course!.
NMAP Tutorial.
Create password wordlists like a pro!!.
Hydra tutorial.
Web parameter tampering attack explained! - [For educational purpose].
Install Kali Linux on Windows 10 | Windows Subsystem for Linux(WSL2).
Best hacking Operating System??.
Best PC or Laptop configuration for Cybersecurity/Bugbounty.
Reflected XSS || Live demo.
Google hacking.
Top 10 Hacking tools.
Virtual Private Network || Best VPN's.
GitHub Recon.
How to view Android application source code??.
Let's Discuss about Passwords!.
Basic recon on Websites/Webservers.
P0wny Shell || Best PHP reverse shell.
Hping3 Tutorial.
Broken Access Control Vulnerability.
Bypassing OTP.
Bypassing OTP || Part-2.
Post Exploitation File Transfers || Penetration Testing.
How I was able to view sensitive details of other users || Bugbounty POC.
How to get started with Bug Bounty hunting??.
Steal cookies by exploiting stored XSS.
Web Application Firewall detection techniques.
Sn1per || An Automated Pentesting Framework.

Taught by

Sathvik Techtuber

Reviews

4.0 rating, based on 2 Class Central reviews

Start your review of Bugbounty Hunting

  • Profile image for Prince Kumar
    Prince Kumar
    The course was well-structured, covering essential aspects of hunting, safety protocols, and practical skills. The instructor demonstrated extensive knowledge and ensured a participative and engaging environment. I found the overall experience enriching and highly recommend the course.
  • Moussouni Abdelkader
    I find it really helpful and it's very clear and I wish if you could do more courses about bug bounty hunter

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.