![]() |
|
Ethical Hacking Pentesting & Bug Bounty Hunting V2 2025 - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Ethical Hacking Pentesting & Bug Bounty Hunting V2 2025 (/Thread-Ethical-Hacking-Pentesting-Bug-Bounty-Hunting-V2-2025) |
Ethical Hacking Pentesting & Bug Bounty Hunting V2 2025 - OneDDL - 05-27-2025 ![]() Free Download Ethical Hacking Pentesting & Bug Bounty Hunting V2 2025 Last updated 3/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 4.60 GB | Duration: 10h 20m Complete Practical Course on Ethical Hacking, Penetration Testing and Bug Bounty Hunting with Live Attacks 2025 What you'll learn Bug Bounty Hunting - Live Tips and Tricks to hunt bugs BreakDown of Hackerone Reports for better understanding Interview Preparation Questions Answers and Approach Web Application Penetration Testing - Live Become a bug bounty hunters & Hunt on Live Websites Intercept requests using a Burpsuite proxy Gain full control over target server using SQL Injection Attacks Discover Vulnerabilities, technologies & services used on target website. Subdomain Takeovers SQLi Interview Questions and Answers Hunt Basic HTML Injection Vulnerabilities on Live Environments Hunt Basic ClickJacking Vulnerabilities on Live Environments Exploit and perform Local File Inclusion (LFI) on Live websites Exploit and perform RemoteFile Inclusion (RFI) on Live websites Exploit and perform Remote Code Execution (RCE) on Live websites Fix and Mitigations against SQLi Vulnerabilities Practical Tips and Tricks for hunting SQLi Live Broken Link Hijacking Fix and Mitigations against RCE Vulnerabilities Interview Questions and answers Bug Bounty - Roadmap for Hackerone Bug Bounty - Roadmap for Bugcrowd Bug Bounty - Roadmap for Open Bug Bounty Bug Bounty - Roadmap for NCIIPC (Govt of India) Bug Bounty - Roadmap for RVDP All Programs Reporting Templates Requirements Basic IT Skills No Linux, programming or hacking knowledge required. Computer with a minimum of 4GB ram/memory & Internet Connection Operating System: Windows / OS X / Linux Description Overview Section 1: Introduction Lecture 1 Disclaimer Section 2: Future Updates Lecture 2 Future Updates Section 3: Setting up Environment Lecture 3 Burp Suite Proxy Lab Setup Section 4: Subdomain Takeovers Lecture 4 What are Subdomains Lecture 5 Subdomain Enum Lecture 6 What is DNS Lecture 7 Fastest Resolver Lecture 8 What are DNS Records Lecture 9 Sublister Lecture 10 Findomain Lecture 11 Subfinder Lecture 12 Recursive Subdomain Enumeration Lecture 13 Can I take over XYZ Lecture 14 Can I take over ALL XYZ Lecture 15 AWS Subdomain Takeover Live -1 Lecture 16 AWS Subdomain Takeover Live -2 Lecture 17 AWS Bugcrowd Report Breakdown Lecture 18 Tumblr Subdomain Takeover Lecture 19 Shopify Subdomain Takeover Lecture 20 Cargo Subdomain Takeover Lecture 21 Subzy Tool Automation for Subdomain Takeovers Lecture 22 Subjack - Tool for Subdomain Takeovers Lecture 23 Subdomain Takeover Revision Section 5: HTML Injection Lecture 24 What is HTML Lecture 25 Understanding HTML Lecture 26 HTML Lecture 27 HTML Injection - Lab Lecture 28 HTML Injection Live-1 Lecture 29 HTML Injection Revision Section 6: Click Jacking Lecture 30 Click Jacking Live-1 Lecture 31 Click Jacking Live-2 Lecture 32 Click Jacking Live-3 Lecture 33 Click Jacking Live-4 Lecture 34 Clickjacking Exploitation Lecture 35 Clickjacking Live Target Exploitation Lecture 36 Clickjacking Automation Live Target Exploitation Lecture 37 Clickjacking - ClickBandit with Burpsuite Lecture 38 Clickjacking Revision Section 7: File Inclusion Exploitation Lecture 39 What is LFI Lecture 40 LFI Exploitation on Lab Lecture 41 LFI Exploitation Live -1 Lecture 42 LFI Exploitation Live -2 Lecture 43 LFI Exploitation LFi to RCE Lecture 44 LFI vs RFI Lecture 45 File Inclusion Exploitation Revision Section 8: Broken Link Hijacking Lecture 46 Introduction & Background Concept Lecture 47 BLH Exploitation Practical Lecture 48 BLH Exploitation Tool Lecture 49 BLH Instagram Report Breakdown Lecture 50 BLH Exploitation Practical Live Lecture 51 BLH Hackerone Report Breakdown Lecture 52 BLH Practical Tool Resource Lecture 53 BLH Exploitation Practical Extension Tool Lecture 54 BLH Command Injection Lecture 55 BLH Exploitation Github Repo - Live Lecture 56 Broken Link Hijacking Revision Section 9: SQL Injection Lecture 57 SQL Injection Background Concept Lecture 58 SQL vs Spreadsheets Lecture 59 SQL Database Importance Lecture 60 XAMPP Installation & Setup Lecture 61 SQL Practical Hands on - First Table Lecture 62 SQL Practical Hands on - Queries Lecture 63 SQL Practical Hands on - Second Table Lecture 64 SQL Practical Hands on - Exercise Lecture 65 Truth Table Lecture 66 Truth Table Practical Lecture 67 SQL Understanding the Logic Lecture 68 SQL Query Breakdown Lecture 69 SQL Injection Impact & Approach Lecture 70 SQLi on Lab-1 Lecture 71 SQL Query Breakdown payload-2 Lecture 72 SQLi on Lab-2 Lecture 73 Burp suite Web Academy Lecture 74 SQLi Labs Data Retrieval Lab Lecture 75 SQLi Labs Data Retrieval Live Lecture 76 SQLi Login Bypass Lab Lecture 77 SQLi Login Bypass Live 1 Lecture 78 SQLMap Installation & Setup Lecture 79 SQLMap Exploitation - Live 2 Lecture 80 SQLMap Exploitation - Live 3 Lecture 81 Shell Exploitation Techniques Lecture 82 SQL : Shell Exploitation - Live 4 Lecture 83 SQLi Revision Section 10: SSRF Lecture 84 SSRF Introduction & Principle Lecture 85 SSRF Practical Lecture 86 SSRF Bincatcher Listener Lecture 87 SSRF against Server Itself Lecture 88 SSRF against another Backend Server Lecture 89 SSRF Bypass Protection Blacklist Filter Lecture 90 SSRF Bypass Protection Whitelist Filter Lecture 91 SSRF Chaining with Open Redirect and Bypass Filter Lecture 92 SSRF Exploitation using MPEG - Live Lecture 93 SSRF Exploitation JIRA chaining with XSS - Live Lecture 94 SSRF Exploitation JIRA chaining with XSS - Live Lecture 95 SSRF Exploitation JIRA Automation with Python Lecture 96 SSRF Facebook Breakdown Lecture 97 SSRF Microstrategy Live -1 Lecture 98 SSRF PHP Filter Live Lecture 99 SSRF PHP Filter Wordpress Config Live Section 11: Remote Code Execution Lecture 100 Apache Unomi RCE Live Section 12: How to start with Bug Bounty Platforms and Reporting Lecture 101 BugCrowd ROADMAP Lecture 102 Hackerone ROADMAP Lecture 103 Open Bug Bounty ROADMAP Lecture 104 Synack ROADMAP Lecture 105 Intigriti ROADMAP Lecture 106 NCIIPC Govt of India ROADMAP Lecture 107 RVDP All Websites ROADMAP Section 13: Bug Bounty / Penetration Testing Reporting Templates Lecture 108 Reporting Templates - We have your back! Section 14: Snapshot Lecture 109 Snapshot of Subdomain Enumeration Lecture 110 Snapshot of Broken link Hijacking Section 15: PortSwigger Labs Lecture 111 Solving Portswigger Lab SQL Injection -1 Section 16: Learning LFIscan Lecture 112 LFIscan Section 17: Mastering Subdomain Enumeration in Penetration Testing Lecture 113 Basics and Common Mistakes to Avoid while doing Subdomain Enumeration Lecture 114 Subdomain Enumeration Strategies Lecture 115 Learning DOME - A subdomain enumeration tool Section 18: Automating SQL Injection using Ghauri Lecture 116 Learning Ghauri Anybody interested in learning website & web application hacking / penetration testing.,Any Beginner who wants to start with Penetration Testing,Any Beginner who wants to start with Bug Bounty Hunting,Trainer who are willing to start teaching Pentesting,Any Professional who working in Cyber Security and Pentesting,Ethical Hackers who wants to learn How OWASP Works,Beginners in Cyber Security Industry for Analyst Position,SOC person who is working into a corporate environment,Developers who wants to fix vulnerabilities and build secure applications Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |