Open saurabh-jindal opened 5 years ago
Do the attendees need any special software installed on the system? Any Linux package, for example?
also, I'd recommend you to reduce the number of topics mentioned. I'm not sure if they're all wilidly different, but if some of them can be nested, better not to mention them explicitly unless really relevant. Given the limited time frame of 4 hours split across 4 weeks, I doubt if they will be able to grasp enough of the concepts within the timeframe
I will start them with ease so they can grasp.
👍
Looking forward to the series!
@saurabh-jindal could you please update this issue with your slides if any and if this series hasn't been completed would you be interested in doing this virtually ?
Abstract Bug Bounty is an initiative that rewards individuals for discovering and responsible reporting software security vulnerabilities. White hat hackers use their skills for finding bugs and secure the organisation.
Gathering Info & Reconnaissance Hacking arsenal XSS Host Header Injections URL redirection Parameter Tempering HTML Injection Missing SPF record File Inclusion Insecure CORS IDORs SSRF CSRF Critial File found Hostile Domain takeover SQL injection Command Injection File Uploading Vulnerability Report and the road forward.
Overview The list of proposed talks :
Pre-requisite 1)Make sure you are using some form of linux operating system. 2)Open your mind palace for the fun ahead. 3)Bring your hacking machine with you.
Resources https://medium.com/bugbountywriteup/bug-bounty-hunting-methodology-toolkit-tips-tricks-blogs-ef6542301c65