Expired

Bug Bounty Hunting With Burp Suite

Deal Score+2
Deal Score+2

Description

How to Use Burp Suite Features for better Bug Bounty Hunting. Advanced Burpsuite training course.

In this course you will learn about:-

Burp Suite Introduction

Why you need Burpsuite PRO

Burpsuite Pro vs free

Which version is best

BurpSuite Community Tricks

Tips For Burpsuite Pro

Proxy:- Firefox Proxy, multiple proxies, Upstream proxy, 

Repeater:- Websockets, Requests

Intruder :- types of attack , payload types, Intruder grep match , grep XSS payloads, sequencers

Comparer between requests

Extender:- extender API, Bapp Store, Environment Setup,

Burpsuite Extensions

Collaborator Client

Top 15 Extensions

Attacks on Live website

How to setup android lab

what is ADB

what is a virtual device

how to intercept traffic from an android device

how to do SSL-unpinning Bypass using Xposed Framework

These lectures are mostly designed for Bug Bounty Hunters and some topics are for advanced users.

if you are any type  of learner it will help you to get into the burp suite

you will learn many tips and tricks throughout  the course, it will help you in real life hunting

you will Understand how HTTP communication works

you will get Basic knowledge of Web vulnerabilities

Basic knowledge of VPNs and proxies

How BurpSuite Top Extensions Works

This course will help you get acquainted with Burp Suite. Burp Suite is the most important tool for Web Penetration Testing! Discover vulnerabilities and develop attacks such as Brute-Forcing, Cross-Site Scripting, SQL injection, etc.
However, you will get to know various web attacks. The attacks will target a test environment based on OWASP WebGhoat vulnerable web applications. The course is fully hands-on so that you can practice yourself everything while you learn.

What you’ll learn

  • Burp-suite advanced methods
  • Burp suite plugins
  • Burp-suite advanced functions
  • Burp-Suite Macros
  • Burp-Suite tricks
  • Burp-Suite Tools
  • Burpsuite Extensions
  • Burpsuite Android
  • Android Bug bounty
  • Android Bug bounty lab Setup
  • Burpsuite Advanced proxy
  • Burpsuite Live attacks
  • Advanced Intruder
  • Intruder Attack Type
  • Intruder Payload Processing
  • Intruder engine

Requirements

  • Basics IT Skills
  • 4Gb ram , any OS
  • Operating System: Windows / OS X / Linux.

Who this course is for:

  • Red-teamers
  • IT students
  • Ethical hacker
  • Bug bounty hunter
  • Hackers
×

Report Post