Bug Bounty Course 2024 Updated

preview_player
Показать описание
All my videos are for educational purposes with bug bounty hunters and penetration testers in mind YouTube don't take down my videos 😉 Ethical hacking web application hacking and bug bounty hunting

links to resources used in this course

0:00 About the course
1:33 ALL about Recon
01:46:33 URL Hacking
02:08:52 Installing Juice Shop
02:17:06 IDOR & BL
03:05:25 Updated IDOR
03:13:25 Updated SQL Injection
04:10:02 Path Traversal
04:28:03 Updated XML & XXE
04:42:05 Updated HTML & JavaScript
05:38:23 Updated XSS Cross Site Scripting
06:02:35 Updated API Enumeration
06:16:507 Updated JWT Hacking
06:25:56 SSRF Server Side Request Forgery
06:48:30 Command Injection
07:14:30 File Upload
07:35:42 LFI & RFI
08:04:53 Cookies and Tokens
08:25:32 Wordpress and CMS
08:49:25 Introduction to Python
09:44:46 Python GitHub Scraper
10:40:46 Introduction to Bash Scripting
Рекомендации по теме
Комментарии
Автор

Damn I watched "How to start Bug Bounty 2023" last year, passed my PJWT cert this year, found recently my first bug, but I'm still gonna watch this year edition, always something new to learn!

HoraceLM
Автор

Many many thanks for this. This is awesome. I would prefer each chapter as a separate video in a playlist as trying to work along at the same time searching the timeline is a nightmare.

danfay
Автор

Boss, could you please create a comprehensive video series covering advanced topics such as advanced time based blind SQL injection injection, XSS, LFI, RFI, and RCE, including the process of uploading web shells on Apache and IIS web servers in live website scenarios? Traditional platforms like test.vulner, DVWA, bWapp, PortSwigger, etc., fail to address real-world challenges like identifying origin IPs, DNS brute force attacks, reverse IP lookups, WAF/IDS/IPS circumvention, AWS/CDN/Tor, reverse proxies, and CMS security 🤙. Your unique content would be invaluable in educating the bug bounty hunting community about genuine issues and solutions. Thanks in advance for your contributions to the community.

Free.Education
Автор

Awesome contents! Bravo . Been going through your 😢 past courses on your bug bounty for the past couple of days while going via the HTB CPTS . Bravo!

k_usuan
Автор

At 8:03:33 "i:0" works for the access token because the server is comparing the access_token that is in our cookie to a valid one on the server. When it compares the two it uses the "==" operator. This operator behaves differently in PHP, basically our token is stored as a string normally, but if we modify the token in our cookie it to be an integer 0, it will cause the server to compare an integer to a string. PHP is weird in that it automatically tries to convert strings to integers if you ever try to compare the two with the "==" operator. If the string happens to start with a nonnumerical character it'll just convert the string to the integer 0. So 0=0 will evaluate as true and the access_token will be valid.

D.sNutssss
Автор

11 hour course and It's free, you are god send sir, thank you so much.

husseindhooma
Автор

Thanks for your hard work
for this version, and the 2022 version.

-rd
Автор

Thanks man I usually don't watch this kind of content, but after seeing the length of it I got intrigued and now I'm half an hour in😅

MathemadicaPrinkipia
Автор

You read my mind man, thanks sir your content can't be matched on youtube, we're really glad that you provide such a quality content. Going to complete in two days anyhow, thanks a lot man : )

bash-ian
Автор

ive learned alot from the key group of ethical hackers who make content but your full free guides take the cake man! appreciate the time you all put in!

comosaycomosah
Автор

OMG, this is a massive course. Thank you so much for all your effort and commitment with our community.💗💓💖

cloey_b
Автор

Thank you for your hard work and quality content that you share with us

denverzimunya
Автор

I just got into hacking a few months ago, and your videos have been a massive help to me. I have yet to get into the bug bounty hunting process, but I'm excited to get started!
Thanks for the impressive guides!

Xerver
Автор

Being a hacker is like making some hidden ads with Monster energy drink! thanks for this course!

Itsmynickname
Автор

OMG 12 hs free. You are awesome man. Thank you very much!

Znd
Автор

Currently on the bash scripting part. Made till this far. I would just say a single word for this course and it is : marvelous

prdxhacks
Автор

Wow i just got about an hour into your other bug bounty course and was loving it. Now time to switch to this course 😂

TzMKnight
Автор

8:03:28
0 == "Example string" // true
In PHP, when you compare a number to a string using the == operator, PHP will attempt to convert the string to a number if possible. If the string does not start with any numeric characters, PHP will convert it to 0.

So, when you compare 0 == "Example string", PHP converts the string "Example string" to a number, resulting in 0. As both sides of the comparison are now 0, the comparison evaluates to true.

This behavior is part of PHP's type juggling mechanism, where it tries to make sense of comparisons between different types by converting one or both operands to a compatible type.

dixelinho
Автор

thanks thanks thanks every detail of the update version of the previous version of the 11 hr course was written by hand the lines of code and references basically a lot of incredible stuff was written, I hope you read it because you are helping a lot with my work thanks we will still hunt a bug together I will be active thanks for the content really wtf bro this new version of yours is advanced vision a hug I hope you read it, a hug from a bughunter thanks again golden content

Fractal_reComm
Автор

Please I want to download your Udemy bug bounty. But it isn’t updated over there, what do I do, or can you please update it?

kolawoleoyedokun