What's new
Joint purchases club

Clubbingbuy.com — a platform for joint purchases of information products, where you can get access to the best courses, books and materials for minimal money!

Recruitment of participants ðŸ”¥ Jason Haddix - Bug Bounty Hunters Methodology 2024 (2 days course)

🔥 Jason Haddix - Bug Bounty Hunters Methodology 2024 (2 days course)

SpreadTrader

New member
Jason Haddix - Bug Bounty Hunters Methodology 2024 (2 days course)


Original website:
https://arcanuminfosec.gumroad.com/l/wumuc

Content: full course (2 videos + 2 pdfs 5.41 GB)


Description:

The Bug Hunter's Methodology (TBHM) is a two-day, paid, virtual training that aims to equip you with the latest tools, techniques, and strategies, plus provide a data-driven methodology on how and where to search for vulnerabilities that are currently common in the wild.

Unlike other courses, TBHM is not an AZ or beginner-oriented course. True to the spirit of my public TBHM talks, my emphasis is on expert tips, time-saving tricks, practical Q&As, automation strategies and vetted resources.


Syllabus

  • Day 1
    • Recon Part 1: Recon Concepts
    • Recon Part 2: Acquisitions and Domains
    • Recon Part 3: Subdomain Enumeration
    • Recon Part 4: Server & App Level Analysis
    • Recon Part 5: Profiling People for Social Engineering
    • Recon Part 6: Recon Adjacent Vulnerability Analysis
    • Recon Part 7: Recon Frameworks and Helpers
  • Day 2
    • Application Analysis Part 1: Analysis Concepts
    • Application Analysis Part 2: Vulnerability Automation
    • Application Analysis Part 3: Content Discovery
    • Application Analysis Part 4: The Big Questions
    • Application Analysis Part 5: Application Heat Mapping
    • Application Analysis Part 6: Web Fuzzing & Analyzing Fuzzing Results
    • Application Analysis Part 7: Introduction to Vulnerability Types
    • Application Analysis Part 8: XSS Tips and Tricks
    • Application Analysis Part 9: IDOR Tips and Tricks
    • Application Analysis Part 10: SSRF Tips and Tricks
    • Application Analysis Part 11: XXE
    • Application Analysis Part 12: File Upload Vulnerabilities Tips and Tricks
    • Application Analysis Part 13: SQL Injection Tips and Tricks
    • Application Analysis Part 14: Command Injection Tips and Tricks
    • Application Analysis Part 15: COTS and Framework Scanning
    • Application Analysis Part 16: Bypass of security controls
 
Back
Top Bottom