Learn About The Next 5 Bugs That Really Work
About This Video
- Develop the skills you need to become a successful bug hunter
- Discover how to find bugs in a step-by-step manner with the help of demos
HackerOne offers just the right opportunity by letting you legally hack some of the biggest companies such as Twitter, Uber, Yahoo, Coinbase, and Slack. You can even get paid for your findings, with the chance to earn anything from $100 to $10,000 per bug. All you need to get started is an internet connection and the right skills that this course will equip you with.
With this second part to the successful Start Hacking and Making Money Today at HackerOne course, you’ll be able to build your knowledge in bug bounty hunting and become a successful hunter through comprehensive insights into the 5 expert-approved bugs.
You’ll start by understanding how to impersonate a user via an insecure log in. The course will then get you up to speed with sensitive information in metadata. As you progress, you will discover all about disclosure of credentials that will help you further in finding vulnerabilities in programs. Next, the course will guide you through insecure password changes and dictionary attacks. All along, you’ll learn through a hands-on approach, finding bugs in a systematic manner with the help of demos.
By the end of this course, you will have the skills you need to effectively find bugs and successfully be a part of bug bounty programs.
Table of contents
Chapter 1 : Introduction
- Introduction 00:07:36
- Chapter 2 : How to Impersonate a User via Insecure Log In
- Chapter 3 : Sensitive Information in Metadata
- Chapter 4 : Disclosure of Credentials
- Chapter 5 : Insecure Password Change
- Chapter 6 : Dictionary Attack
Chapter 7 : Summary
- Summary 00:04:03
- Title: Keep Hacking and Making Money at HackerOne
- Release date: April 2019
- Publisher(s): Packt Publishing
- ISBN: 9781838828967
You might also like
Real-World Bug Hunting
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks …
Bug Bounty Program Certification
A Step-by-step guide to learn latest tools and techniques to hunt bugs in applications and to …
Black Hat Go
Black Hat Go explores the darker side of Go, the popular programming language revered by hackers …
Python for Data Analysis, 2nd Edition
Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. Updated for Python 3.6, …