Resultados 1 al 1 de 1

Tema: Bug Bounty Hunting With Burp Suite

Ver modo hilado

Mensaje anterior Mensaje anterior   Próximo mensaje Próximo mensaje
  1. #1
    Fecha de ingreso
    marzo 2021
    Mensajes
    55
    Agradecido: 3

    Predeterminado Bug Bounty Hunting With Burp Suite

    2104051525120098 - Bug Bounty Hunting With Burp Suite

    Bug Bounty Hunting With Burp Suite

    Duration: 6h 4m | Video: .MP4, 1280x720 30 fps | Audio: AAC, 44.1 kHz, 2ch | Size: 2.73 GB
    Genre: eLearning | Language: English



    How to Use Burp-Suite Features for better Bug Bounty Hunting.
    What you'll learn
    Burp-suite advanced methods
    Burp suite plugins
    Burp-suite advanced functions
    Burp-Suite Macros
    Burp-Suite tricks
    Burp-Suite Tools

    Requirements
    Basics IT Skills
    4Gb ram , any OS
    Operating System: Windows / OS X / Linux.
    Description
    In this course you will learn about:-

    Burp Suite

    why you need Burpsuite

    Pro vs free

    Which version is best

    why you need Pro

    Tips of Burpsuite

    what is proxy

    multiple proxies

    upstream proxy

    repeater

    intruder

    types of attack

    payload types

    grep

    grep match

    grep xss payloads

    sequencers

    comparer

    extender

    many plugins

    extender API

    how to setup android lab

    what is ADB

    what is a virtual device

    how to intercept traffic from an android device

    how to do SSL-unpinning

    these lectures are mostly designed for beginner to intermediate and some topics are for advanced users.

    if you are any type of learner it will help you to get into the burp suite

    you will learn many tips and tricks throughout the course, it will help you in real life hunting

    you will Understand how HTTP communication works

    you will get Basic knowledge of Web vulnerabilities

    Basic knowledge of VPNs and proxies

    This course will help you get acquainted with Burp Suite. Burp Suite is the most important tool for Web Penetration Testing! Discover vulnerabilities and develop attacks such as Brute-Forcing, Cross-Site Scripting, SQL injection, etc.
    However, you will get to know various web attacks. The attacks will target a test environment based on OWASP WebGhoat vulnerable web applications. The course is fully hands-on so that you can practice yourself everything while you learn.

    Who this course is for:
    burp suite for bug bounty hunting and ethical hacking.
    Red-teamers
    IT students
    Ethical hacker
    Bug bounty hunter

    Contenido oculto. Ha de estar registrado, y pulsar el botón "Gracias" para visualizar sus enlaces de descarga.
    Si trás registrarse todavía no visualiza el botón de "gracias", pulse la tecla F5, para refrescar la página.
    Última edición por Fahrenheit_451; 5 abril 2021 a las 12:23

Etiquetas para este tema

Permisos de publicación