Module 1 : Introduction to Bug Bounty
- What is bug bounty and its benefits.
- Bug bounty platforms to earn.
- Bug Bounty hunter methodology.
Module 2 : How to Approach a target
- Find Your Target
- Acquisition and Subsidiaries
- In scope & Out of Scope
- Identify technologies used
- Identify low hanging fruits
Module 3 : Reconnaissance on Wildcard Domain
- Enumerating Subdomain (sublist3r, Subfinder, amass)
Shodan
Censys
zoomeye
Google dorks
- Wayback URLs (gau)
- Sort Live Domains & Subdomain (httpx)
- Fuzzing (dirsearch, ffuf)
- Check for files that expose content, such as robots.txt, sitemap.xml
- Review HTML Source Code
- Github Repo Review
Finding sensitive data
Analyse code base
GitHub Advance Search
Module 4 : Burp Suite (Advanced)
- Automating Session Attacks
- Pitchfork Attack
- Burp Sequencer
- Burp Extender
- Match and Replace
Module 5 : Modern Web Application Attacks
- Session's Vulnerabilities
- Authorization Flaws
- Business Logic Vulnerabilities
- Insecure Deserialization
- OAuth Misconfiguration
- Cross Site Request Forgery (CSRF)
- Server-Side Request Forgery (SSRF)
- Server-Side Template Injection (SSTI)
- XML External Entity Injection (XXE)
- Cross-Site Scripting (XSS)
- CRLF Injection
- SQL Injection
- NoSQL Injection
- GraphQL Injection
Module 6 : Bypass firewall & security policies
- Reverse shell V/s Bind Shell
- Bypass Mod security
- Bypass input validation
Module 7 : Attack Automation
- Nmap
- Nuclei
- Dalfox
- GF
- script automation
Module 8 : Effective Vulnerability Reporting