0% found this document useful (0 votes)
562 views7 pages

Levelup0X Bug Bounty Hunting Training PDF

The document outlines the syllabus for a Levelup0X Bug Bounty Hunting Training course which will provide both basic and intermediate practical training on finding vulnerabilities in live modern web applications covering over 200 bugs and vulnerabilities using methodology from Bugcrowd VRT, SANS Top 25 errors, OWASP CWE and CAPEC. Students will learn tools like Burp Suite and methodology for starting a freelance career in security research and bug bounty hunting.

Uploaded by

Mohamed said
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
562 views7 pages

Levelup0X Bug Bounty Hunting Training PDF

The document outlines the syllabus for a Levelup0X Bug Bounty Hunting Training course which will provide both basic and intermediate practical training on finding vulnerabilities in live modern web applications covering over 200 bugs and vulnerabilities using methodology from Bugcrowd VRT, SANS Top 25 errors, OWASP CWE and CAPEC. Students will learn tools like Burp Suite and methodology for starting a freelance career in security research and bug bounty hunting.

Uploaded by

Mohamed said
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

B​ug Bounty Hunting | 

W​ebApp Pentest  
T​raining 
L​ive Websites ​Practice

 
Syllabus​: Levelup0X Bug Bounty Hunting Training 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Requisite: Basic Knowledge of WebApp and Vulnerability 

Level: Basic -> Intermediate  

Training Level:​ Each Bugs we will Practically demonstrate you on Live Modern WebApp not 
on dummy WebApps 
 

Why you Join us : 


01.​ 100% #Practical on #Live Secure | Unsecure web applications 
02.​ Covered 200+ Bugs & Vulnerabilities with two-time practicals 
03.​ Real-time Challenges with every Training Modules 
04.​ Customized Training also provide for InfoSec Employer 
05.​ We cover CVE+CWE+CAPEC+SANS 25 Software Errors 
 

Reconnaissance & Source Code Analysis   

● Dynamic Analysis of Web Application Source Code 


● Dynamic Analysis of Complete JavaScript Source  
● Enumeration of Publicly Accessible Cloud Storage 
● Common Crawling & Sensitive Directory Enumeration 
● Manual & Automated Subdomain Analysis | Discovery  
● Identifying & Testing for Subdomain Takeover Issues 

Testing for Authentication Issues  

● Improper Authorization 
● Improper Authentication  
● Weak Login Function Issues 
● Bypass Single factor Authentication 
● Bypass Two factor (2FA) Authentication 
● Execution with Unnecessary Privileges 
● Insecure Direct Object Reference (IDOR) 
● Account Takeover related Logical Issues 
● Exploiting Forgot Password Functionality 
● Bypass Authentication on Critical Functions 
● Session Expiration & Session Fixation Issue 
● OAuth Redirect_URI Issues (Token Hijacking) 
● User Impersonation vulnerability | Exploitation  
● Authorization Bypass Through User-Controlled Key 
● OAuth Permission Models Issues (Account Takeover) 
● Improper Permission Assignment for Critical Resource 

Testing for Web Application Encryptions  

● Missing Required Cryptographic Step 


● Cleartext Transmission of Session Token 
● Exploitaing Encrypted Cookies | Sessions  
● Cleartext Storage of Sensitive Information 
● Exploiting Encrypted Password Reset Tokens  
● Exploiting Encrypted Coupon Codes from Source 
● Use of a Broken or Risky Cryptographic Algorithm 

Testing for Arbitrary Injections 

● CSV Injection 
● CSS Injections 
● CRLF Injections 
● Iframe Injection 
● Cookie Injections 
● LDAP Query Injections 
● Host Header Injections 
● Apache Struts Vulnerability 
● Remote Code Executions (RCE) 
● XML External Entity Injection 
● HTML5 Security & HTML Injections  
● Argument Injection or Modification 
● XPath Injection & Data Query Logic 
● Server Side Template Injections (SSTI) 

Testing for Sensitive Data Exposure 

● Password Disclosure 
● Full Path Disclosure 
● Sensitive Token in URL 
● Internal IP Disclosure 
● Token Leakage via Referer 
● Directory Listing Enabled  
● Default Credentials Issues 
● Disclosure Private API Keys 
● Default/Config Files Testing 
● Detailed Server Configuration 
● Exposed Internal Admin Portal 
● Disclosure Private Git Repository 
● Mixed Content (HTTPS Sourcing HTTP) 
● User Enumeration (Sensitive Data Leaks) 
● DBMS Misconfiguration Excessively Privileged User 
● EXIF Geolocation Data Not Stripped From Uploaded Images 

Testing for Traditional Security Issues 

● Directory Traversal Attacks 


● Remote File Inclusion Vulnerability 
● Cross-Site Request Forgery (CSRF) Attacks 
● Server-Side Request Forgery (SSRF) Attacks 
● Cross-Origin Resource Sharing (CORS) Attacks 
● SSL Attack (BREACH, POODLE, HEARTBLEED) 
● Unrestricted File Upload with Dangerous Type 
● URL Redirection to Untrusted Site (Open Redirect) 

Testing for Dos / Buffer Overflow Issues  

● XML-RPC Pingback DoS Attack 


● Incorrect Calculation of Buffer Size 
● XML External Entity (DTD) DoS attacks 
● Buffer Copy without Checking Size of Input 

Testing for Common Issues 

● Captcha Bypass Attacks 


● DNS Zone Transfer Issues 
● Clickjacking (UI Readdressing) 
● Deserialization of Untrusted Data 
● Missing Authentication for Critical Function 
● Parameter Pollution in Social Sharing Buttons 

Testing for Low Priority issues 

● JSON Hijacking 
● No Password Policy 
● Same-Site Scripting Issues 
● Lack of Notification Email 
● Lack of Verification Email 
● Mail Server Misconfiguration 
● Reflected File Download (RFD) 
● Weak Registration Implementation 
● Missing Secure or HTTPOnly Cookie Flag 
● No Rate Limiting on Login | Registration 
● No Rate Limiting on SMS | Email-Triggering 
● Race Conditions Enabled on Applications Functions 

Vulnerability Analysis Tools  

● API Testing with Telerik Fiddler 


● Bug Hunting | Behaviour Analysis with Burpsuite 

Penetration Testing Methodology & Standard we covered  

● Bugcrowd Vulnerability Rating Taxonomy (VRT) 


● SANS Top 25 Most Dangerous Applications Errors 
● Owasp CWE : Vulnerabilities in Modern Web Applications 
● Common Attack Pattern Enumeration and Classification (CAPEC) 

Start your own Freelance Career and How to take Projects from 
Companies | Online Sources 

● We will guide you how to take IT Security Govt Projects 


● We will guide you how to take Online Freelance Projects 
● We will guide you how to work in Companies as Freelancer 
● We will guide you how to take Projects from Corporate Companies 
 
 

You might also like