Ethical Hacking / Penetesting & Bug Bounty Hunting

*#1 Most Popular Online Course & Internship in Cyber Security* You can enroll today & get certified from EasyShiksha & HawksCode.

Ethical Hacking / Penetesting & Bug Bounty Hunting Description

Welcome to Ethical Hacking / Penetration Testing and Bug Bounty Hunting Course. This course covers web application attacks and how to earn bug bounties. There is no prerequisite of prior hacking knowledge and you will be able to perform web attacks and hunt bugs on live websites and secure them.

This course is not like other hacking or penetration testing course with outdated vulnerabilities and only lab attacks. This contains maximum live websites to make you comfortable with the Live Hunting Environment.

This course will start from basic principles of each vulnerability and How to attack them using multiple bypass techniques, In addition to exploitation, you will also learn how to fix them.

This course is highly practical and is made on Live websites to give you the exact environment when you start your penetrating testing or bug hunting journey.

We will start from the basics of OWASP to the exploitation of vulnerabilities leading to Account Takeover on live websites.

This course is divided into a number of sections, each section covers how to hunt, exploit and mitigate a vulnerability in an ethical manner.

After identification of a vulnerability, we will exploit to leverage the maximum severity out of it. We will also learn how to fix vulnerabilities which are commonly found on the websites on the internet.

In this course, you will also learn How can you start your journey on many famous bug hunting platforms like Bugcrowd, Hackerone and Open Bug Bounty.

Along with this, you will be able to hunt and report vulnerabilities to NCIIPC Government of India, also to private companies and to their responsible disclosure programs.

You will also learn Advance techniques to bypass filters and the developers logic for each kind of vulnerability. I have also shared personal tips and tricks for each attacks where you can trick the application and find bugs quickly.

This course also includes the Breakdown of all Hackerone Reports which are found and submitted by other hackers for better understanding as we will cover each type of technique in the course.

This course also includes important interview questions and answers which will be helpful in any penetrating testing job interview.

Here's a more detailed breakdown of the course content:

In all the sections we will start the fundamental principle of How the attack works, Exploitation and How to defend from those attacks.

In OWASP, We will cover what is OWASP and Top 10 vulnerabilities.

We will also understand what is the difference between owasp 2013 vs 2017.

1. In Cross site scripting XSS, we will cover all diff types of attacks like Reflected XSS, Stored XSS and DOM XSS. In addition, we will learn Advance Exploitation for Limited Inputs and Filter Bypass.

We will see all the types of XSS attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.

We will also cover different ways to perform XSS Exploitation using multiple types of payloads like Phishing, File Upload, Cookie Stealing and Redirection.

We will also see the exploitation of Blind XSS which generally other researchers miss out.

This course also includes a breakdown of all the Hackerone reports submitted by other hackers for XSS type of vulnerability wherein we will see and practice all types of attacks in our course.

In the end, we will also cover mitigations to secure a website and prevent these types of attacks.

In the end, I have added Interview Questions and answers which be helpful for you when XSS questions are asked in any job or internship.

2. In Authentication Bypass, we will cover all diff types of ways to attack like OTP Bypass, 2FA Bypass, Captcha bypass, Email Verification Bypass etc. So we will perform all the ways to attack protection on websites.

We will see all the types of Authentication bypass on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.

We will also cover different ways to perform Auth Bypass Exploitation using different techniques.

This course also includes a breakdown of all the Hackerone reports submitted by other hackers for Authentication Bypass type of vulnerability wherein we will see and practice all types of attacks in our course.

In the end, we will also cover mitigations to secure a website and prevent these types of attacks.

I have added Interview Questions and answers which be helpful for you when Auth Bypass questions are asked in any job or internship.

3. In No Rate-Limit Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities in signup/creation of account or Login using password or verification of OTP or Tokens.

We will see all the types of No Rate-Limit attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.

We will also cover different ways to perform No RL Exploitation using multiple types by automated spoofing our IP address on each request the same way this bug was found on Instagram and was awarded $15000 bounty.

We will also cover how to throttle our requests by changing the requests and giving delay between each simultaneous request to bypass IDS and RateLimit checkers on the server-side.

We will also see the exploitation of No RL on various injection points which generally other researchers miss out.

This course also includes a breakdown of all the Hackerone reports submitted by other hackers for No RL type of vulnerability wherein we will see and practice all types of attacks in our course.

In the end, we will also cover mitigations to secure a website and prevent these types of attacks.

4. In CSRF Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities can lead to Account Takeover by changing the email and password.

We will see all the types of CSRF attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.

We will also cover different ways to perform CSRF attacks and bypass CSRF protection on many live websites.

This course also includes a breakdown of all the Hackerone reports submitted by other hackers for No RL type of vulnerability wherein we will see and practice all types of attacks in our course.

In the end, we will also cover mitigations to secure a website and prevent these types of attacks.

5. In CORS Attacks, we will check this vulnerability for different injection points, In addition, we will learn how to find these types of vulnerabilities can lead to Sensitive Data Disclosure of other users.

We will see all the types of CORS attacks on live websites which will give you a better understanding of the live environment when you will start your bug hunting journey.

We will also cover different ways to perform CORS attacks and bypass CORS protection on many live websites by using suffix and prefix types tricks.

This course also includes a breakdown of all the Hackerone reports submitted by other hackers for CORS type of vulnerability wherein we will see and practice all types of attacks in our course.

In the end, we will also cover mitigations to secure a website and prevent these types of attacks.

You will also get additional BONUS sessions, in which I m going to share my personal approach for hunting bugs. All the videos are recorded on Live websites so that you understand the concepts as well as you get comfortable to work on a live environment. I have also added Interview Questions and answers for each attack which will be helpful for those are preparing for Job Interviews and Internships in the field of Information Security.

Course Content

course-lock Course Introduction course-lock Disclaimer course-lock What is OWASP and Injection course-lock What is Broken Authentication course-lock What is Sensitive Data Exposure course-lock What is XML External Entities course-lock What is Broken Access Control course-lock What is Security Misconfiguration course-lock What is Cross Site Scripting (XSS) course-lock What is Insecure Deserialization course-lock What is Using Components with Known Vulnerabilities course-lock What is Insufficient Logging and Monitoring course-lock Burp Suite Proxy Lab Setup course-lock Authentication Bypass Exploitation Live -1 course-lock Authentication Bypass Exploitation Live -2 course-lock Authentication Bypass Exploitation Live -3 course-lock Authentication Bypass Exploitation Live -4 course-lock Authentication Bypass Exploitation Live -5 course-lock Authentication Bypass Exploitation Captcha course-lock Authentication Bypass to Account Takeover Live -1 course-lock Authentication Bypass to Account Takeover Live -2 course-lock Authentication Bypass due to OTP Exposure Live -1 course-lock Authentication Bypass due to OTP Exposure Live -2 course-lock Authentication Bypass 2FA Bypass Live course-lock Authentication Bypass - Email Takeover Live course-lock Authentication Bypass Mitigations course-lock Authentication Bypass Interview Questions and Answers course-lock No Rate-Limit leads to Account Takeover Live Type-1 course-lock NO RL Alternative Tools Introduction course-lock No Rate-Limit leads to Account Takeover Live Type -2 course-lock No Rate-Limit leads to Account Takeover Live Type -3 course-lock No Rate-Limit leads to Account Takeover Live Type -4 course-lock No Rate-Limit leads to Account Takeover Live Type -5 course-lock No Rate-Limit to Account Takeover Live - Type 6 course-lock No Rate-Limit to Account Takeover Live - Type 7 course-lock No Rate-Limit Instagram Report Breakdown course-lock No Rate-Limit Instagram Report Breakdown 2 course-lock No Rate Limit Bypass Report Breakdown course-lock No Rate Limit Bypass Report Breakdown 2 course-lock No Rate-Limit to Tool Fake IP Practical course-lock No Rate-Limit test on CloudFare course-lock No Rate-Limit Mitigations course-lock No Rate-Limit All Hackerone Reports Breakdown course-lock Burp Alternative : OWASP ZAP Proxy for No RL course-lock How XSS Works course-lock Reflected XSS on Live 1 course-lock Reflected XSS on Live 2 course-lock Reflected XSS on Live Manual Balancing course-lock Reflected XSS on Live 3 Balanced course-lock XSS on Limited Inputs Live 1 course-lock XSS on Limited Inputs Live 2 course-lock XSS in Request Headers - Live course-lock Reflected XSS Useragent and Caching course-lock Reflected XSS Email Validator Live course-lock Reflected XSS Protection Bypass Live 1 - Base64 course-lock Reflected XSS Protection Bypass Live -2 course-lock XSS using Spider course-lock XSS Bypass Right Click Disabled course-lock Blind XSS Exploitation course-lock Stored XSS Exploitation Live course-lock DOM XSS Name course-lock DOM XSS Redirect course-lock DOM XSS Index course-lock DOM XSS Automated Scanner course-lock XSS on Live by Adding Parameters course-lock XSS Mouse on Lab course-lock XSS Mouse Live course-lock XSS Mouse Events All Types course-lock XSS Polyglots Live course-lock XSS Polyglots Breakdown course-lock XSS Exploitation - URL Redirection course-lock XSS Exploitation - Phishing course-lock XSS Exploitation Cookie Stealer Lab course-lock XSS Exploitation Cookie Stealer Live course-lock XSS Exploitation File Upload Type -2 course-lock XSS Exploitation File Upload Type -3 course-lock XSS Exploitation File Upload Type- 1 course-lock XSS Mitigations course-lock XSS Bonus TIPS and TRICKS course-lock XSS Hackerone ALL Reports Breakdown course-lock XSS Interview Questions and Answers course-lock How CSRF Works course-lock CSRF Alternative Tools Introduction course-lock CSRF on LAB course-lock CSRF on LAB - 2 course-lock CSRF on Live -1 course-lock CSRF on Live -2 course-lock CSRF Password Change Lab course-lock CSRF Mitigations course-lock CSRF BONUS Tips and Tricks course-lock CSRF ALL Hackerone Reports Breakdown course-lock CSRF Interview Questions and Answers course-lock Alternative to Burpsuite for CSRF : CSRF PoC Generator course-lock How CORS Works course-lock CORS 3 Test Cases Fundamentals course-lock CORS Exploitation Live -1 Exfiltration of Account Details course-lock CORS Exploitation Live -2 Exfiltration of Account Details course-lock CORS Live Exploitation -3 course-lock CORS Exploitation Facebook Live course-lock CORS Live Prefix Match course-lock CORS Live Suffix Match course-lock CORS Mitigations course-lock CORS Breakdown of ALL Hackerone Reports course-lock BugCrowd ROADMAP course-lock Hackerone ROADMAP course-lock Open Bug Bounty ROADMAP course-lock NCIIPC Govt of Inida ROADMAP course-lock RVDP All Websites ROADMAP course-lock Exploitation course-lock Assets & Resources course-lock Final Words course-lock Exploitation of CVE 2020-3452 File Read course-lock Exploitation of CVE 2020-3187 File Delete

What You Need For This Course & Internship?

  • Access to Smart Phone / Computer
  • Good Internet Speed (Wifi/3G/4G)
  • Good Quality Earphones / Speakers
  • Basic Understanding of English
  • Dedication & Confidence to clear any exam

Internship Students Testimonials

Reviews

Relevant Courses

easyshiksha badges
Frequently Asked Questions

Q.Is the course 100% online? Does it require any offline classes too?

The following course is fully online, and hence there is no need for any physical classroom session. The lectures and assignments can be accessed anytime and anywhere through a smart web or mobile device.

Q.When can I start the course?

Anyone can choose a preferred course and start immediately without any delay.

Q.What are the course and session timings?

As this is a purely online course program, you can choose to learn at any time of the day and for as much time as you want. Though we follow a well-established structure and schedule, we recommend a routine for you as well. But it finally depends on you, as you have to learn.

Q.What will happen when my course is over?

If you have completed the course, you would be able to have lifetime access to it for future reference too.

Q.Can I download the notes and study material?

Yes, you can access and download the content of the course for the duration. And even have lifetime access to it for any further reference.

Q. What software/tools would be needed for the course and how can I get them?

All the software/tools that you need for the course would be shared with you during the training as and when you need them.

Q. Do I get the certificate in a hard copy?

No, only a soft copy of the certificate will be awarded, which can be downloaded and printed, if required.

Q. Iโ€™m unable to make a payment. What to do now?

You can try to make the payment through a different card or account (maybe a friend or family). If the problem persists, email us at info@easyshiksha.com

Q. The payment got deducted, but the updated transaction status is showing โ€œfailedโ€. What to do now?

Due to some technical faults, this can happen. In such a case the amount deducted will be transferred to the bank account in the next 7-10 working days. Normally the bank takes this much time to credit the amount back into your account.

Q. The payment was successful but it still shows โ€˜Buy Nowโ€™ or not showing any videos on my dashboard? What should I do?

At times, there may be a slight delay in your payment reflecting on your EasyShiksha dashboard. However, if the problem is taking longer than 30 minutes, please let us know by writing to us at info@easyshiksha.com from your registered email id, and attach the screenshot of the payment receipt or transaction history. Soon after verification from the backend, we will update the payment status.

Q. What is the refund policy?

If you have enrolled, and are facing any technical problem then you can request a refund. But once the certificate has been generated, we shall not refund that.

Q.Can I just enrol in a single course?

Yes! You surely can. To begin this, just click the course of your interest and fill in the details to enrol. You are ready to learn, once the payment is made. For the same, you earn a certificate too.

My questions are not listed above. I need further help.

Please contact us at: info@easyshiksha.com

Experience the Speed: Now Available on Mobile!

Download EasyShiksha Mobile Apps from Android Play Store, Apple App Store, Amazon App Store, and Jio STB.

Curious to learn more about EasyShiksha's services or need assistance?

Our team is always here to collaborate and address all your doubts.

Whatsapp Email Support