- Introduction to Bug Bounty
- Information Gathering
- Setting Up Labs
- Introduction to Burp Suite
- SQL Injection
- Web Application Attacks
- Cross Site Script (XSS)
- Header Injection & URL Redirection
- Client Side Attacks
- Brute Forcing
- Security Misconfigurations& Exploiting Web Apps
- Insecure CORS
- File Inclusion Vulnerability
- Server-Side Request Forgery
- Insecure Captcha
- Automating VAPT & Advanced Information Gathering
- Documenting & Reporting Vulnerability
- Conclusion of Bug Bounty
DISCLAIMER : No Copyright Infringement Intended, All Rights Reserved to the Actual Owner.
This content has been shared under Educational And Non-Profit Purposes Only.
if you are owner of any courses and you want to delete that course then pls tell us we will delete that course and we will never share that course again.