0% found this document useful (0 votes)
53 views2 pages

Bug Bounty Hunting Syllabus

Uploaded by

ayanpathak804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views2 pages

Bug Bounty Hunting Syllabus

Uploaded by

ayanpathak804
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Bug Bounty Hunting Syllabus

Module 1: 2 Hours - 3 Topics


 Introduction (Day 1)
 Introduction Burpsuit (Day 1)
 Information Gathering (Day 1)

Module 2: 2 Hours - 2 Topics


 XSS (Day 2)
 Blind XSS (Day 2)

Module 3: 2 Hours - 2 Topics


 Host header Injection (Day 3)
 Data Tampering (Day 3)

Module 4: 2 Hours - 2 Topics


 Vulnerability Related to SPF (Day 4)
 HTML Injection (Day 4)

Module 5: 2 Hours - 2 Topics


 File Inclusion (Day 5)
 Forced Browsing (Day 5)

Module 6: 2 Hours - 1 Topic


 Server Side Request Forgery (SSRF) (Day 6)

Module 7: 2 Hours - 1 Topic


 Source Code Disclosure Vunerability (Day 7)

Module 8: 2 Hours - 2 Topics


 SQL Injection (Day 8)
 Advance SQL Injection (Day 8)

Module 9: 2 Hours - 1 Topic


 Advance SQL Injection (Day 9)

Module 10: 2 Hours - 1 Topic


 Cross Site Request Forgery (CSRF) (Day 10)

Module 11: 2 Hours - 2 Topics


 XML External (Day 11)
 Rate Limiting Attack (Day 11)

Page 1
Module 12: 2 Hours - 2 Topics
 Long Password Dos attack (Day 12)
 Buffer overflow (Day 12)

Module 13: 2 Hours - 2 Topics


 IDOR (Day 13)
 Account Takeover (Day 13)

Module 14: 2 Hours - 2 Topics


 CMS Vulnerability (Day 14)
 Drupal (Day 14)

Module 15: 2 Hours - 2 Topics


 Information Disclosure (Day 15)
 Cryptographic related vulnerability (Day 15)

Module 16: 2 Hours - 2 Topics


 Command Injection (Day 16)
 Different types of RCE (Remote Code Execution) (Day 16)

Module 17: 2 Hours - 1 Topic


 Web cache deception (Day 17)

Module 18: 2 Hours - 1 Topic


 SSTI (Server-Side Template Injection) (Day 18)

Module 19: 2 Hours - 2 Topics


 DNS Zone transfer (Day 19)
 Session Puzzling (Day 19)

Module 20: 2 Hours - 2 Topics


 HSTS (HTTP Strict Transport Security) (Day 20)
 GraphSQL (Day 20)

Page 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy