0% found this document useful (0 votes)
43 views3 pages

Advance Bug Bounty Curriculum

The document outlines an advanced bug bounty training program consisting of eight modules, each lasting four hours, covering topics such as reconnaissance tactics, OAuth attacks, JWT attacks, WAF bypasses, and WordPress pentesting. The curriculum includes practical labs and a final exam to assess knowledge. Contact information for the training provider is also provided.

Uploaded by

zerobyte365
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views3 pages

Advance Bug Bounty Curriculum

The document outlines an advanced bug bounty training program consisting of eight modules, each lasting four hours, covering topics such as reconnaissance tactics, OAuth attacks, JWT attacks, WAF bypasses, and WordPress pentesting. The curriculum includes practical labs and a final exam to assess knowledge. Contact information for the training provider is also provided.

Uploaded by

zerobyte365
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Advance

Bug Bounty
Module 01 Introduction | 04 Hours Module 04 JWT Attacks | 04 Hours
• What are Advance Bug Bounties • Abusing None Algorithm
• Advance Recon Methodology • Signature Stripping
• Mindmap Creation • HS256 (symmetric encryption) key
• Setting Up your Hacking environment cracking
• Cracking weak shared secrets
Module 02 Recon Tactics | 04 Hours
• Substitution attack
• Effective Shodan Reconnaisance
• Practical Lab
• Active Subdomain Enumeration +
• CTF
Resolvers
• Subdomain Mastering with Advance Module 05 JWT Attacks | 04 Hours
techniques SAML
• Building an Attack Surface Mapper •SAML Fundamentals
• Building an Bug Bounty Alert System •SAML vs OAuth
•SAML Request & Response Breakdown
Module 03 Oauth | 04 Hours •XML Signatures
• Implicit Grant Attack •XML Signature Wrapping Attacks-Type1
• OAuth CSRF protection Attack Bypass •XML Signature Wrapping Attacks-Type2
• Leaking Authorization codes and •XML Signature Wrapping Attacks-Type3
Access tokens •XML Signature Wrapping Attacks-Type4
• Flawed Scope Validation Attack •XML Signature Wrapping Attacks-Type5
• Unverified User Registration Attack •XML Signature Wrapping Attacks-Type6
• Host header Injection Oauth Attack •XML Signature Wrapping Attacks-Type7
• Reusable OAuth access token Attacks •XML Signature Wrapping Attacks-Type8
• State Parameter Bypass •SAML Extractor
•SAML Raider
•SAML to XSS Attacks
•SAML Token Recipient Confusion Attack
•Xml External Entities Attacks via SAML
•Mitigations
Module 06 WAF Bypasses | 04 Hours Module 08 Active Directory | 04 Hours
• XSS Bypasses Active Directory
• SQL Injection Bypass • Active Directory Fundamentals
• ModProxy & Cloudflare Bypass • Setting up Domain Controller
• CTF • Setting up GPO
• Extracting Information Windows AD
Module 07 Wordpress Pentesting | 04 Hours
• Office365 Recon
Wordpress Pentesting
• Mimikatz LSASS
• Wordpress Active Enumeration
• Windows Local Previlage Escalation
• Wordpress Passive Enumeration
with Hot Potato
• Wordpress Users, Themes, Plugins,
• Process Injection
Versions
• DLL Injection
• XML-RPC leads to DoS and DDoS
• Defense Evation
• Wordpress SSRF
• Wordpress Twenty Sixteen RCE
• Wordpress MSF Exploitation Final Exam | 02 Hours
• Wpscan
• CTF

Thank You!!! +91-9106147779 +91-8160206309


@hacktifycs www.hactify.in
[email protected] @hacktifycs
@hacktifycs
Unit no. 1021, 1st floor-1 Aerocity, SakiNaka, Andheri(East), Mumbai- 400072

You might also like