riversongs Posted May 27 Report Share Posted May 27 Free Download Ethical Hacking Penetesting & Bug Bounty Hunting 2025Last updated 3/2025MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 6.33 GB | Duration: 11h 22mComplete Practical Course on Ethical Hacking, Penetration Testing and Bug Bounty Hunting with Live Attacks 2025What you'll learnOWASP 10 and FundamentalsOWASP Top 10 2013 vs 2017Bug Bounty Hunting - LiveTips and Tricks to hunt bugsBreakDown of Hackerone Reports for better understandingInterview Preparation Questions Answers and ApproachWeb Application Penetration Testing - LiveBecome a bug bounty hunters & Hunt on Live WebsitesIntercept requests using a Burpsuite proxyGain full control over target server using Authentication Bypass AttacksGain full control over target server using Captcha Bypass AttacksGain full control over target server using OTP /2FA Bypass AttacksDiscover Vulnerabilities, technologies & services used on target website.Authentication Bypass Interview Questions and AnswersHunt Basic XSS Vulnerabilities on Live EnvironmentsExploit and perform Acccount Takeovers on Live websitesAuthentication Bypass Mitigations and FixesAuthentication Bypass Breakdown of Hackerone ReportsBreakdown of No-Rate Limit of all Hackerone Reports by HackersHunt Advance XSS Vulnerabilities by Filter and WAF BypassHunt Vulnerabilities and Bug Bounty using XSS vulnerabilities.Fix and Mitigations against XSS VulnerabilitiesAuthentication Bypass Bonus Tips and TricksPractical Tips and Tricks for hunting XSS LiveBreakdown of XSS of all Hackerone Reports by HackersInterview Questions and Answers for XSS AttacksGain full control over target server using CSRF AttacksHunt Vulnerabilities using Advance CSRF TechniquesPerform Complete Account Takeover using CSRF on LabPerform Complete Account Takeover using CSRF on LiveHunt Advance CSRF Vulnerabilities by Filter BypassFix and Mitigations against CSRF VulnerabilitiesPractical Tips and Tricks for hunting CSRF LiveBreakdown of CSRF of all Hackerone Reports by HackersInterview Questions and Answers for CSRF AttacksGain full control over target server using CORS AttacksHunt Vulnerabilities using Advance CORS TechniquesExfiltrating Sensitive Information by CORS VulnerabiltiyFix and Mitigations against CORS VulnerabilitiesPractical Tips and Tricks for hunting CORS LiveBreakdown of CORS of all Hackerone Reports by HackersHunt Vulnerabilities using No Rate-Limit TechniquesComplete Account Takeover at by No Rate-Limit VulnerabilityFix and Mitigations against No Rate-Limit VulnerabilitiesPractical Tips and Tricks for hunting No Rate-Limit LiveInterview Questions and answers of CORSBug Bounty - Roadmap for HackeroneBug Bounty - Roadmap for BugcrowdBug Bounty - Roadmap for OpenBugBountyBug Bounty - Roadmap for NCIIPC (Govt of India)Bug Bounty - Roadmap for RVDP All ProgramsReporting TemplatesLive Shodan HuntingLive CVE HuntingRequirementsBasic IT SkillsNo Linux, programming or hacking knowledge required.Computer with a minimum of 4GB ram/memory & Internet ConnectionOperating System: Windows / OS X / LinuxDescriptionWelcome to Ethical Hacking / Penetration Testing and Bug Bounty Hunting Course. This course covers web application attacks and how to earn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.This course is not like other hacking or penetration testing course with outdated vulnerabilities and only lab attacks. This contains maximum live websites to make you comfortable with the Live Hunting Environment.This course will start from basic principles of each vulnerability and How to attack them using multiple bypass techniques, In addition to exploitation, you will also learn how to fix them.This course is highly practical and is made on Live websites to give you the exact environment when you start your penetrating testing or bug hunting journey.We will start from the basics of OWASP to the exploitation of vulnerabilities leading to Account Takeover on live websites.This course is divided into a number of sections, each section covers how to hunt, exploit and mitigate a vulnerability in an ethical manner.After identification of a vulnerability, we will exploit to leverage the maximum severity out of it. We will also learn how to fix vulnerabilities which are commonly found on the websites on the internet.In this course, you will also learn How can you start your journey on many famous bug hunting platforms like Bugcrowd, Hackerone and Open Bug Bounty.Along with this, you will be able to hunt and report vulnerabilities to NCIIPC Government of India, also to private companies and to their responsible disclosure programs.You will also learn Advance techniques to bypass filters and the developers logic for each kind of vulnerability. I have also shared personal tips and tricks for each attacks where you can trick the application and find bugs quickly.This course also includes the Breakdown of all Hackerone Reports which are found and submitted by other hackers for better understanding as we will cover each type of technique in the course.This course also includes important interview questions and answers which will be helpful in any penetrating testing job interview.Here's a more detailed breakdown of the course content:In all the sections we will start the fundamental principle of How the attack works, Exploitation and How to defend from those attacks.In OWASP, We will cover what is OWASP and Top 10 vulnerabilities.We will also understand what is the difference between owasp 2013 vs 2017.1. In Cross site scripting XSS, we will cover all diff types of attacks like Reflected XSS, Stored XSS and DOM XSS. In addition, we will learn Advance Exploitation for Limited Inputs and Filter Bypass.We will see all the types of XSS attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform XSS Exploitation using multiple types of payloads like Phishing, File Upload, Cookie Stealing and Redirection.We will also see the exploitation of Blind XSS which generally other researchers miss out.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for XSS type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.In the end, I have added Interview Questions and answers which be helpful for you when XSS questions are asked in any job or internship.2. In Authentication Bypass, we will cover all diff types of ways to attack like OTP Bypass, 2FA Bypass, Captcha bypass, Email Verification Bypass etc. So we will perform all the ways to attack protection on websites.We will see all the types of Authentication bypass on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform Auth Bypass Exploitation using different techniques.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for Authentication Bypass type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.I have added Interview Questions and answers which be helpful for you when Auth Bypass questions are asked in any job or internship.3. In No Rate-Limit Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities in signup/creation of account or Login using password or verification of OTP or Tokens.We will see all the types of No Rate-Limit attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform No RL Exploitation using multiple types by automated spoofing our IP address on each request the same way this bug was found on Instagram and was awarded $15000 bounty.We will also cover how to throttle our requests by changing the requests and giving delay between each simultaneous request to bypass IDS and RateLimit checkers on the server-side.We will also see the exploitation of No RL on various injection points which generally other researchers miss out.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for No RL type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.4. In CSRF Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities can lead to Account Takeover by changing the email and password.We will see all the types of CSRF attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform CSRF attacks and bypass CSRF protection on many live websites.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for No RL type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.5. In CORS Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities can lead to Sensitive Data Disclosure of other users.We will see all the types of CORS attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.We will also cover different ways to perform CORS attacks and bypass CORS protection on many live websites by using suffix and prefix types tricks.This course also includes a breakdown of all the Hackerone reports submitted by other hackers for CORS type of vulnerability wherein we will see and practice all types of attacks in our course.In the end, we will also cover mitigations to secure a website and prevent these types of attacks.You will also get additional BONUS sessions, in which I m going to share my personal approach for hunting bugs. All the videos are recorded on Live websites so that you understand the concepts as well as you get comfortable to work on a live environment. I have also added Interview Questions and answers for each attack which will be helpful for those are preparing for Job Interviews and Internships in the field of Information Security.With this course, you get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you as soon as possible.Notes:This course is created for educational purposes only and all the websites I have performed attacks are ethically reported and fixed.Testing any website which doesn't have a Responsible Disclosure Policy is unethical and against the law, the author doesn't hold any responsibility.OverviewSection 1: Course IntroductionLecture 1 Course FAQLecture 2 Course IntroductionLecture 3 DisclaimerLecture 4 Rules for asking QuestionsSection 2: OWASP Top 10Lecture 5 What is OWASP and InjectionLecture 6 What is Broken AuthenticationLecture 7 What is Sensitive Data ExposureLecture 8 What is XML External EntitiesLecture 9 What is Broken Access ControlLecture 10 What is Security MisconfigurationLecture 11 What is Cross Site Scripting (XSS)Lecture 12 What is Insecure DeserializationLecture 13 What is Using Components with Known VulnerabilitiesLecture 14 What is Insufficient Logging and MonitoringLecture 15 Revision of OWASPSection 3: Burp Suite and Lab SetupLecture 16 Burp Suite Proxy Lab SetupLecture 17 Burpsuite Setup RevisionSection 4: Authentication BypassLecture 18 Authentication Bypass Exploitation Live -1Lecture 19 Authentication Bypass Exploitation Live -2Lecture 20 Authentication Bypass Exploitation Live -3Lecture 21 Authentication Bypass Exploitation Live -4Lecture 22 Authentication Bypass Exploitation Live -5Lecture 23 Authentication Bypass Exploitation CaptchaLecture 24 Authentication Bypass to Account Takeover Live -1Lecture 25 Authentication Bypass to Account Takeover Live -2Lecture 26 Authentication Bypass due to OTP Exposure Live -1Lecture 27 Authentication Bypass due to OTP Exposure Live -2Lecture 28 Authentication Bypass 2FA Bypass LiveLecture 29 Authentication Bypass - Email Takeover LiveLecture 30 Authentication Bypass MitigationsLecture 31 Authentication Bypass Interview Questions and AnswersLecture 32 Authentication Bypass RevisionSection 5: No Rate-Limit AttacksLecture 33 No Rate-Limit leads to Account Takeover Live Type-1Lecture 34 NO RL Alternative Tools IntroductionLecture 35 No Rate-Limit leads to Account Takeover Live Type -2Lecture 36 No Rate-Limit leads to Account Takeover Live Type -3Lecture 37 No Rate-Limit leads to Account Takeover Live Type -4Lecture 38 No Rate-Limit leads to Account Takeover Live Type -5Lecture 39 No Rate-Limit to Account Takeover Live - Type 6Lecture 40 No Rate-Limit to Account Takeover Live - Type 7Lecture 41 No Rate-Limit Instagram Report BreakdownLecture 42 No Rate-Limit Instagram Report Breakdown 2Lecture 43 No Rate Limit Bypass Report BreakdownLecture 44 No Rate Limit Bypass Report Breakdown 2Lecture 45 No Rate-Limit to Tool Fake IP PracticalLecture 46 No Rate-Limit test on CloudFareLecture 47 No Rate-Limit MitigationsLecture 48 No Rate-Limit All Hackerone Reports BreakdownLecture 49 Burp Alternative : OWASP ZAP Proxy for No RLLecture 50 No Rate-Limit RevisionSection 6: Cross Site Scripting (XSS)Lecture 51 How XSS WorksLecture 52 Reflected XSS on Live 1Lecture 53 Reflected XSS on Live 2Lecture 54 Reflected XSS on Live Manual BalancingLecture 55 Reflected XSS on Live 3 BalancedLecture 56 XSS on Limited Inputs Live 1Lecture 57 XSS on Limited Inputs Live 2Lecture 58 XSS in Request Headers - LiveLecture 59 Reflected XSS Useragent and CachingLecture 60 Reflected XSS Email Validator LiveLecture 61 Reflected XSS Protection Bypass Live 1 - Base64Lecture 62 Reflected XSS Protection Bypass Live -2Lecture 63 XSS using SpiderLecture 64 XSS Bypass Right Click DisabledLecture 65 Blind XSS ExploitationLecture 66 Stored XSS Exploitation LiveLecture 67 DOM XSS NameLecture 68 DOM XSS RedirectLecture 69 DOM XSS IndexLecture 70 DOM XSS Automated ScannerLecture 71 XSS on Live by Adding ParametersLecture 72 XSS Mouse on LabLecture 73 XSS Mouse LiveLecture 74 XSS Mouse Events All TypesLecture 75 XSS Polyglots LiveLecture 76 XSS Polyglots BreakdownLecture 77 XSS Exploitation - URL RedirectionLecture 78 XSS Exploitation - PhishingLecture 79 XSS Exploitation Cookie Stealer LabLecture 80 XSS Exploitation Cookie Stealer LiveLecture 81 XSS Exploitation File Upload Type -2Lecture 82 XSS Exploitation File Upload Type -3Lecture 83 XSS Exploitation File Upload Type- 1Lecture 84 XSS MitigationsLecture 85 XSS Bonus TIPS and TRICKSLecture 86 XSS Hackerone ALL Reports BreakdownLecture 87 XSS Interview Questions and AnswersLecture 88 XSS RevisionLecture 89 XSS Revision - 2Section 7: Cross Site Request Forgery (CSRF)Lecture 90 How CSRF WorksLecture 91 CSRF Alternative Tools IntroductionLecture 92 CSRF on LABLecture 93 CSRF on LAB - 2Lecture 94 CSRF on Live -1Lecture 95 CSRF on Live -2Lecture 96 CSRF Password Change LabLecture 97 CSRF Funds Transfer LabLecture 98 CSRF Request Methods Trick - LabLecture 99 CSRF to Account Takeover Live -1Lecture 100 CSRF to Account Takeover Live -2Lecture 101 Chaining CSRF with XSSLecture 102 CSRF MitigationsLecture 103 CSRF BONUS Tips and TricksLecture 104 CSRF ALL Hackerone Reports BreakdownLecture 105 CSRF Interview Questions and AnswersLecture 106 Alternative to Burpsuite for CSRF : CSRF PoC GeneratorLecture 107 CSRF RevisionSection 8: Cross Origin Resource Sharing (CORS)Lecture 108 How CORS WorksLecture 109 CORS 3 Test Cases FundamentalsLecture 110 CORS Exploitation Live -1 Exfiltration of Account DetailsLecture 111 CORS Exploitation Live -2 Exfiltration of Account DetailsLecture 112 CORS Live Exploitation -3Lecture 113 CORS Exploitation Facebook LiveLecture 114 CORS Live Prefix MatchLecture 115 CORS Live Suffix MatchLecture 116 CORS MitigationsLecture 117 CORS Breakdown of ALL Hackerone ReportsLecture 118 CORS RevisionSection 9: How to start with Bug Bounty Platforms and ReportingLecture 119 BugCrowd ROADMAPLecture 120 Hackerone ROADMAPLecture 121 Open Bug Bounty ROADMAPLecture 122 NCIIPC Govt of Inida ROADMAPLecture 123 RVDP All Websites ROADMAPLecture 124 Bug Bounty PlatformsSection 10: Bug Bounty Reporting TemplatesLecture 125 Reporting TemplatesSection 11: Exploitation of CVE 2020-5902 Remote Code ExecutionLecture 126 ExploitationLecture 127 Assets & ResourcesLecture 128 Final WordsSection 12: Exploitation of CVE 2020-3452 File ReadLecture 129 Exploitation of CVE 2020-3452 File ReadSection 13: Exploitation of CVE 2020-3187 File DeleteLecture 130 Exploitation of CVE 2020-3187 File DeleteSection 14: SnapshotLecture 131 Snapshot of BurpsuiteSection 15: PortSwigger LabsLecture 132 XSS Portswigger Lab-1Lecture 133 CSRF Portswigger Lab - 2Section 16: OWASP top 10 2021Lecture 134 Understanding OWASP 2021 and Broken AuthenticationLecture 135 Tips and Best Practices for IDORLecture 136 How to approch IDOR vulnerabilitySection 17: Learning Waybackurlsbash toolLecture 137 Tool :- WaybackurlbashSection 18: XSS AutomationLecture 138 Reflected XSSAnybody interested in learning website & web application hacking / penetration testing.,Any Beginner who wants to start with Penetration Testing,Any Beginner who wants to start with Bug Bounty Hunting,Trainer who are willing to start teaching Pentesting,Any Professional who working in Cyber Security and Pentesting,Ethical Hackers who wants to learn How OWASP Works,Beginners in Cyber Security Industry for Analyst Position,SOC person who is working into a corporate environment,Developers who wants to fix vulnerabilities and build secure applicationsHomepagehttps://www.udemy.com/course/website-hacking-penetration-testing-bug-bounty-hunting-live-attacks/Rapidgator Links Downloadhttps://rg.to/file/2d0dd54c5f9ab0d230990f1475078b76/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part1.rar.htmlhttps://rg.to/file/7bdbf72494306fa42bb11ef0adf01699/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part2.rar.htmlhttps://rg.to/file/dd81b4ad5cf8a5aa932cd09c3ee70641/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part3.rar.htmlhttps://rg.to/file/469879222823d3c241f1ead399619469/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part4.rar.htmlhttps://rg.to/file/7f17be355e406069c799469aea31d5c8/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part5.rar.htmlhttps://rg.to/file/140240cc5d319964fcc14e1dfbbdcb8c/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part6.rar.htmlhttps://rg.to/file/c5825dc846996e68dc79eadc47b1dc61/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part7.rar.htmlFikper Links Downloadhttps://fikper.com/6dja470eQX/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part1.rar.htmlhttps://fikper.com/pnZazWB9om/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part2.rar.htmlhttps://fikper.com/0PTs5x21LY/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part3.rar.htmlhttps://fikper.com/2FaL9rSz6X/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part4.rar.htmlhttps://fikper.com/DwJVh7XFvM/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part5.rar.htmlhttps://fikper.com/6phHNb6s5n/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part6.rar.htmlhttps://fikper.com/ZmBAtPpzEv/wzjmw.Ethical.Hacking..Penetesting...Bug.Bounty.Hunting.2025.part7.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now