Video description
Learn the essential tools and techniques for hunting and exploiting vulnerabilities in web and Android applications. Equip yourself with the knowledge and skills to find and responsibly disclose vulnerabilities to companies, gaining rewards through existing bug bounty programs. Master the best practices of ethical hacking to detect bugs and improve security.
This comprehensive, seven-hour course covers three key areas:
Fundamentals of OWASP Top 10 Vulnerabilities
We start the course with a look at the most common vulnerabilities currently present in web applications. The OWASP Top Ten, from the Open Web Application Security Project, helps bug bounty hunters to know what to look for in penetration tests. We break down these vulnerabilities and demonstrate what to look for in order to detect them.
Kali Linux and Web Application Hacking
Web applications are currently some of the most common targets for bug bounties, so we’ll see how to create meaningful attacks against them. We’ll use Kali Linux tools, which are popular with both attackers and the defenders trying to secure web apps against those attacks. We’ll work with Nmap, SQLmap, Commix, Wfuzz, Metasploit, and many other tools to gather information about targets and launch attacks to expose their vulnerabilities.
Foundations of Hacking and Penetration Testing Android Apps
Most companies now have apps that are included in bug bounty programs. Learning how to scan and exploit these apps can often be a lucrative way to gain bounties. Given the new focus on application development, apps make a great target for bug bounties.
Distributed by Manning Publications
This course was created independently by Scott Cosentino and is distributed by Manning through our exclusive liveVideo platform.
About the Technology
About the Video
What's Inside
- Vulnerability Detection
- OWASP Top Ten vulnerabilities
- Kali Linux tools for gathering information, vulnerability analysis, and web app analysis
- Injection Vulnerabilities
- Android hacking and penetration testing
- Bug-hunting tips
About the Reader
Basic knowledge of Linux and programming
About the Author
Scott Cosentino is a developer and teacher who works primarily in software development and computer security. He is passionate about teaching and has inspired students in large classes, one-on-one, and online video courses. He believes mathematics and computer science can be approachable and fun, and tailors his courses to be easy to comprehend, with exploration of the what, why, and how of every topic. Because computer science and programming topics are not spectator sports, he provides many examples and practice problems for students to learn and practice.
Quotes
Table of contents
-
Fundamentals of OWASP Top 10 Vulnerabilities
- Command injections
- SQL injections
- Broken authentication
- Sensitive data exposure
- XML external entities
- Broken access control
- Security misconfiguration
- Cross-site scripting (XSS)
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Insecure direct object referencing (IDOR)
- Setting up Kali Linux
- Information Gathering with Kali Linux
- Vulnerability Analysis with Kali Linux
- Web Application Analysis with Kali Linux
-
Foundations of Hacking and Penetration Testing with Android
- Setting up an Android test environment
- Setting up adb and vulnerable apps
- Decompiling apk files
- Insecure logging
- Hardcoding issues
- Rooting a virtual device
- Insecure data storage
- Input validation
- Installing Drozer
- Attack surface exploits
- Activity exploits
- Content provider exploits
- General bug hunting tips
Product information
- Title: The Complete Guide to Bug Bounty Hunting
- Author(s):
- Release date: May 2023
- Publisher(s): Manning Publications
- ISBN: 10000DIVC202334
You might also like
book
Bug Bounty Hunting Essentials
Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals …
book
Bug Bounty from Scratch
Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital …
book
Ansible: Up and Running, 3rd Edition
Among the many configuration management tools available, Ansible has some distinct advantages: It's minimal in nature. …
video
Kubernetes for the Absolute Beginners - Hands-On
Starting from the fundamental concept of containers, the course gradually unfolds into a comprehensive guide on …