Course Overview

This course covers web application attacks and how to earn bug bounties by exploitation of CVEs on bug bounty programs. There is no prerequisite of prior hacking knowledge, and you will be able to perform web attacks and hunt bugs on live websites and secure them. This course is not like other hacking or penetration testing course with outdated vulnerabilities and only lab attacks. This contains maximum live websites to make you comfortable with the Live Hunting Environment. 

This course will start from the basics of CVE Introduction, CVSS Score, Severity, and Priority and dive into the advanced exploitation of CVEs. This course is highly practical and is made on Live websites to give you the exact environment when you start your penetrating testing or bug-hunting journey. You will learn how to set up Burp Suite Proxy for packet interception to the exploitation of vulnerabilities leading to High Severity Bugs on live websites. This course is divided into several sections, each section covers how to hunt, exploit and report a vulnerability in an ethical manner. After the identification of a vulnerability, you will learn how to exploit it to leverage its maximum severity. In this course, you will also learn How can you start your journey on many famous bug-hunting platforms like BugCrowd, HackerOne, and Open Bug Bounty. Along with this, you will be able to hunt and report vulnerabilities to the NCIIPC Government of India, also to private companies, and their responsible disclosure programs. You will also learn Advance techniques to bypass filters and the developer’s logic for each kind of vulnerability. This course also includes the Breakdown of all HackerOne Reports which are found and submitted by other hackers for better understanding as we will cover each type of technique in the course. This course also includes important interview questions and answers which will be helpful in any penetration testing job interview. 

By the end of the course, you will have gained deep knowledge of how to perform bug bounty hunting by exploiting CVEs. 

What You Will Learn

  • Explore latest 2020 CVEs on Live Websites
  • Performing Recon
  • Hunting CVEs and exploitation
  • Understanding Google Dorks
  • CVSS Score
  • Shodan
  • Censys
  • and Bugcrowd VRT
  • Gain knowledge on Bug Bounty Automation
  • Learn about Horizontal and Vertical Subdomain Enumerations
  • Explore CIA Triad
  • Learn to differentiate and choose between Severity vs Priority

Program Curriculum

  • Disclaimer
  • $7 Million Cybersecurity Scholarship by EC-Council

  • What is CVE?
  • CVE Nomenclature
  • Chapter 2 Quiz

  • BugCrowd VRT 1
  • BugCrowd VRT 2
  • BugCrowd VRT Limitations
  • CIA Triad and Its Importance
  • Severity vs. Priority of Vulnerability
  • Severity vs. Priority 2
  • What is CVSS Score - Importance
  • What is CVSS Score - Attack Vector
  • CVSS - Attack Complexity
  • CVSS - Privilege Required
  • CVSS - User Interaction
  • CVSS - Scope
  • Chapter 3 Quiz

  • Shodan GUI
  • Shodan Report Generation
  • Shodan Report Generation - Part 2
  • Shodan Images
  • Shodan Exploits
  • Chapter 4 Quiz

  • Censys Subdomain Enumeration
  • Censys Subdomain Enumeration Automation
  • Chapter 5 Quiz

  • Google Dorks Manually
  • How to Become Author of Google Dork
  • Chapter 6 Quiz

  • Certificate Transparency Crt.sh
  • Certificate Transparency Crt.sh Wildcards
  • Certificate Transparency Crt.sh Automation
  • Chapter 7 Quiz

  • HackerOne Severity
  • Chapter 8 Quiz

  • Burp Suite Proxy Lab Setup
  • Chapter 9 Quiz

  • Microweber Live Hunting
  • Chapter 10 Quiz

  • Jira Live Hunting Sensitive Data Exposure
  • Jira Live Hunting Sensitive Data Exposure - 2
  • Jira Live Hunting CVE - User Enumeration
  • Chapter 11 Quiz

  • SAP Live Hunting - Authentication Bypass
  • SAP Live Hunting - Code Execution
  • Comparison of Both CVE's
  • Chapter 12 Quiz

  • IceWarp Live Hunting
  • Chapter 13 Quiz

  • BigIP Live Hunting
  • Final Words
  • Chapter 14 Quiz

  • CISCO File Read Live Hunting
  • CISCO File Delete Live Hunting
  • Chapter 15 Quiz

  • Visual Recon with Screenshots
  • Chapter 16 Quiz

  • BugCrowd ROADMAP
  • HackerOne ROADMAP
  • Open Bug Bounty ROADMAP
  • NCIIPC Govt of India ROADMAP
  • Synack ROADMAP
  • RVDP All Websites ROADMAP
  • Intigrity ROADMAP
  • Chapter 17 Quiz

  • HackerOne Hacktivity
  • Bugcrowd Crowdstream
  • Chapter 18 Quiz

  • Setup of Environment
  • Superfast Free Bug Bounty VPS Forever
  • Superfast Free Bug Bounty VPS Forever Updated
  • Chapter 19 Quiz

  • Bug Bounty VPS Alerts & Notifications
  • Chapter 20 Quiz

  • Kubernetes CVE - Apple Hall of Fame
  • Chapter 21 Quiz

  • Citrix Path Traversal Live Hunting
  • Chapter 22 Quiz

  • Apache RCE Live Hunting
  • Chapter 23 Quiz
Load more modules

Instructor

RLBC

Founded in 2019, RLBC is a content production consulting company based in Versailles, France. RLBC works with a team of SME professionals in the fields of Fintech, IT, and content marketing. The company produces digital education content for on-trend SME topics. For the NFT data science subject matter the team, better known as the NFT Guys, includes George, an IT industry veteran leading and managing engineering teams in the cybersecurity-critical sector from Brussels, who is well-versed in creating NFTs, and Robert, a veteran Fintech lecturer and maître conferencier in finance & accounting from New York. Robert is the author of Fashion and Art Coins published on pages 115 – 120 of Edmunds, John C., Editor (2020) Rogue Money and the Underground Economy, An Encyclopedia of Alternative and Cryptocurrencies, Greenwood: ABC – CLIO.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8