- 18 Sections
- 19 Lessons
- Lifetime
Expand all sectionsCollapse all sections
- Introduction of Web Application Penetration Testing3
- Information Gathering & Basic Terminologies3
- Burpsuite – The Ultimate tool of Bug Bounty Hunting2
- Cross Site Scripting (XSS) Vulnerability11
- 4.1Background Concept about XSS
- 4.2Basic XSS
- 4.3Basic XSS on Lab
- 4.4Manual Building XSS Vector
- 4.5XSS through Filter Bypassed XSS payloads On Lab
- 4.6XSS On Live Websites
- 4.7XSS Hunting Live Part 1
- 4.8XSS Through Header Parameter
- 4.9Reflected XSS Vs Stored XSS
- 4.10Exploitation of XSS : – 1. URL Redirection
- 4.11Exploitation of XSS : – 2. Phishing Through XSS
- SQL Injection Vulnerability0
- File Inclusion Vulnerability0
- URL Redirection Vulnerability0
- HTML Injection Vulnerability0
- Host Header Attack0
- Command Injection Vulnerability0
- File Upload Vulnerability0
- Parameter Tampering Vulnerability0
- Critical File Found Vulnerability0
- Source Code Disclosure Vulnerability0
- Cross Site Request Forgery Vulnerability0
- Hostile Subdomain Takeover Vulnerability0
- XML External Entity Injection0
- InSecure CORS Configuration0
