Course Curriculum
Chapter - 1 : Recon and Automation
- 1. Playing with Burp
- 2. All about Recon
- 3. Acquisition Recon (Automation Recon)
- 4. Sub-Domains Enumeration (Automation Recon)
- 5. Sub-Domains Brute force (Automation Recon)
- 6. Subs Dorking (Automation Recon / Manual Recon)
- 7. Removing Duplicates
- 8. Find live sites (Automation Recon)
- 9. Find IP & open Ports (Automation Recon)
- 10. Find Status Code (Automation Recon)
- 11. Screenshots and Content discovery (Automation Recon)
- 12. Crawling and Brute forcing parameters (Automation Recon)
Chapter - 2 : Open Redirect
- 1. About Open Redirect
- 2. DOM Based Open Redirect
- 3. Parameter Based Open Redirect
- 4. Header Based Open Redirect
- 5. POC 1 BaseCamp Open Redirect
- 6. POC 2 Humble Open Redirect
- 7. POC 3 Microsoft Open Redirect
- 8. POC 4 Microsoft Open Redirect leads to Webcam Hacking
- 10. POC 5 Nokia Open Redirect
Chapter - 3 : Abusing HTTP Communication
- 1. About HTTP Header attack
- 2. Methods to Hunt
- 3. DNS Ping-Back Attack
- 4. Password Reset Poisoning
- 5. Web Cache Poisoning
- 6. Web Cache Poisoning (Automation Hunting)
- 7. XSS via HTTP Header
- 8. POC 1 APPLE Blind SSRF
- 9. POC 2 Nokia Blind SSRF
- 10. POC 3 Header based Open Redirect
- 1. About SSRF
- 2. Methods to Hunt SSRF
- 3. Live Hunting of SSRF
- 4. POC 1 Google SSRF
- 5. POC 2 Google Blind SSRF
- 6. POC 3 Pinterest SSRF
Chapter - 5 : Rate Limiting
- 1. About Rate Limiting
- 2. Methods to Hunt Rate Limiting
- 3. Live Hunting of Rate Limiting 1
- 4. Live Hunting of Rate Limiting 2
- 5. Bypass of Rate Limiting
- 6. POC 1 Aptible Rate Limiting
- 7. POC 2 Blanco Rate Limiting
- 8. POC 3 JET Rate Limiting
- 9. POC 4 Paytm Rate Limiting
- 10. POC 5 NL site Rate Limiting
- 11. POC 6 Casper Rate Limiting
Chapter - 6 : Broken Auth
- 1. About Broken Auth
- 2. Methods to Hunt Broken Auth
- 3. Live Hunting of Broken Auth 1
- 4. Live Hunting of Broken Auth 2
- 5. Broken Auth in Password reset
- 6. POC 1 Convertkit Broken Auth
- 7. POC 2 FitBit Broken Auth
- 8. POC 3 GetMoneyTree Broken Auth
- 9. POC 4 SEEK Broken Auth
- 10. POC 5 Electroneum Broken Auth
- 11. POC 6 TransferWise Broken Auth
- 12. POC 7 Trip-Advisor Broken Auth
Chapter - 7 : Image Attack
- 1. About EXIF Attack
- 2. Methods to Hunt EXIF
- 3. Live Hunting of EXIF
- 4. POC 1 TheSecurity EXIF
- 5. POC 2 TheSecurity EXIF Bypass
- 6. About Picture File Upload
- 7. SVG File Upload Attack
- 8. Pixel Flooding Attack
- 9. Users Info Stealing Attack
- 10. POC 1 BaseCamp Pixel Flooding
- 11. POC 2 Nokia Users IP Stealing
- 12. POC 3 TheSecurity Blind XXE
Chapter - 8 : Cloud App Hacking
- 1. About Cloud App Hacking
- 2. Methods to Hunt Cloud App bugs
- 3. Live Hunting of Cloud App bugs
- 4. HTML to PDF Live Attack
- 5. POC 1 SEJDA Blind XSS to SSRF
Chapter - 9 : JSON Response Attack
- 1. About JSON Response Attack
- 2. Methods to Hunt JSON Response Attack
- 3. Live Hunting of JSON Response Attack 1
- 4. Live Hunting of JSON Response Attack 2
- 5. POC 1 SLACK OTP Bypass
- 6. POC 2 STACKPATH 2FA Bypass
- 7. POC 3 UpWork 2FA Bypass
- 8. POC 4 Canva Password Panel Bypass
Chapter - 10 : CSRF/XSRF Attack
- 1. About CSRF/XSRF Attack
- 2. Methods to Hunt CSRF/XSRF Attack
- 3. Live Hunting of CSRF/XSRF Attack
- 4. POC 1 EverNote CSRF/XSRF
- 5. POC 2 Transfer-wise CSRF/XSRF
Chapter - 11 : XSS Attack
- 1. About XSS Attack
- 2. Methods to Hunt XSS Attack
- 3. Live Hunting of XSS Attack
- 4. POC 1 Trip-Advisor XSS
- 5. POC 2 Nl Site XSS
- 6. POC 3 Base-Camp Blind XSS