Website Hacking Penetration Testing & Bug Bounty Hunting
Content:
Chapter 1
Preparation - Creating a Penetration Testing Lab
Preparation - Linux Basics
Website Basics
Information Gathering
File Upload Vulnerabilities
Code Execution Vulnerabilities
Local File Inclusion Vulnerabilities (LFI)
Remote File Inclusion Vulnerabilities (RFI)
SQL Injection Vulnerabilities
SQL Injection Vulnerabilities - SQLi In Login Pages
SQL injection Vulnerabilities - Extracting Data From The Database
SQL injection Vulnerabilities - Advanced Exploitation
XSS Vulnerabilities
XSS Vulnerabilities - Exploitation
Insecure Session Management
Brute Force & Dictionary Attacks
Discovering Vulnerabilities Automatically Using Owasp ZAP
Post Exploitation
Bonus Section
[Hidden content]
follow
@charlie for more : )