logo

Bug Bounty : Web Hacking

Earn by hacking legally

  • 4.5 Rating
  • (10 Reviews)
  • 10 User Enrolled
  • 9.99
  • 200
  • Course Includes
  • English
  • 6:39:23 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
  • 30-Day Money-Back Guarantee


What you will learn

  • Hack websites
  • Participate in bug bounty programs for hackers
  • Earn by hacking legally

Requirements

  • • Basic computer and Internet browsing knowledge • One should have a laptop powered with windows or linux OS

Description

In this course you will learn how to hack facebook, google, paypal type of web application, you will not just learn hacking them, you will even learn how to earn from hacking them and its all 100% legal, Earning by hacking legally is known as bug bounty program, 250+ companies have bug bounty program, Facebook paid 5 million to hackers,Google paid over $6 million and many others do pay. One earns millions to 100,000$/month, so basically bug bounty program is where hackers get paid for hacking and disclosing bugs to parent company, if you want to earn by hacking means this course is for you, this course will help you to get started in bug bounty program.

Course Content

Introduction
preview min
Disclaimer
preview 0:39min
Make Kali Linux Bootable
preview 3:51min
Set up Kali Linux in Vmware
preview 2:25min
Kali Linux Latest Version
preview 3:42min
Setting up Metasploitable
preview 1:31min
Github
preview 2:39min
Free VPN to hide your location
preview 2:12min
DVWA installation in windows
preview 4:31min
Vega
5:51min
Setting up Atmosphere
3:07min
Nikto
5:14min
Sub Domain
5:25min
Recon ng
9:15min
knockpy
2:50min
NMAP
5:45min
NMAP Banner script
2:18min
NMAP http-enum script
2:04min
NMAP http-header
1:46min
Hacking Website Through Open Ports
4:50min
Open port Hackerone reports
1:28min
LFIsuite installation
1:36min
Exploitation of LFI
2:02min
Burp Suite
Live at: 0000-00-00 00:00:00
4:36min
Burp Suite crawling
2:14min
Spider
6:37min
scanner
6:53min
Intruder
6:09min
Authorization
4:15min
BWap
5:23min
wapplayzer
4:39min
Firebug
2:56min
Hack bar
3:31min
User agent Switcher
2:28min
Repeater
3:45min
Sequencer
4:15min
Analyzing Sequencer Data
3:45min
Decoder
1:53min
Comparer
1:59min
Save and Restore
3:32min
Sublist3r
3:32min
Hydra - Online password attacks - Kali Linux
2:36min
Bruteforce password vulnerability
1:44min
WP Scan
4:26min
WP Scan Codex
4:49min
WP Scan Template Monster
7:35min
WP Scan theme
3:22min
WP Scan User
1:05min
CMS Map
2:36min