BUG-BOUNTY-HUNTING-OFFENSIVE-APPROACH-TO-HUNT-BUGS{MEREELLS.SPACE}
A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation[1] for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,[2][3] Facebook,[4] Yahoo!,[5] Google,[6] Reddit,[7] Square,[8] Microsoft,[9][10] and the Internet bug bounty.[11]
Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs.[12] The Pentagon’s use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.[13]
TOPICS
1. Intruduction
2. Information Gathering Basic Terminologies
3. Introduction of Burpsuite
4. Comprehensive XSS
5. Host Header Injection
6. URL Redirection
7. Parameter Tampering
8. HTML Injection
9. Files Inclution
10. Missinginsufficient SPF record
11. Insecure CORS Configuration
12. Server Side Request Forgery
13. Critical File Found
14. Source Code Disclosure
15. Cross Site Request Forgery
16. Hostile Subdomain Takeover
17. SQL Injection
18. Command Injection
19. File Uploading
20. XML External Entity Injection
21. Thank you
NOTE:-This tutorial is for educational purposes we are not responsible for any kind of misuse and we are not encouraging for any illegalthings
Comments
Post a Comment