Nativeva

Nativeva | Certified Bug Bounty Hunter

About Course

Hello Friends In this course I covered many topics about Networking, Subnet & Hosting, Git & GitHub, OWASP, Capture The Flag, Path Traversal, Broken Access Control, Cross-Site Scripting (XSS), SQL Injection, Broken Authentication, Sensitive Data Exposure, Cross-Site Request Forgery (CSRF), OS Command Injection, Etc..
If you have any doubts about this course you can ask in Whatsapp : +91 9361387478 I will respond to you immediately.

In this course, first of all, we discuss what is Bug Bounty?

What is Bug Bounty?

A bug bounty program is a deal offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security vulnerabilities. If no financial reward is offered, it is called a vulnerability disclosure program.

Then we go to the Lab setup.
In this lecture, I used Kali Linux.

Kali Linux is a Debian – derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security.

Then we can take this course about your career-wise.
Scroll Down and Go to our course. Happy Learning
Don’t forget to ask your questions in Whatsapp.

Show More

What Will You Learn?

  • Networking
  • OWASP
  • Git & GitHub
  • Capture The Flag
  • SQL Injection
  • OS Command Injection
  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • WordPress Admin Bypass
  • Remote Code Execution
  • Broken Access Control
  • Path Traversal
  • Broken Authentication
  • DOM XSS & OAuth

Course Content

Bug Bounty

  • 1 CCNA Micro
    01:11:31
  • 2 CCNA Micro Part 2
    01:25:20
  • 3 CCNA Advance
    01:16:57
  • 4 Introduction To Bug Bounty
    54:05
  • 5 Subnet & Hosting
    55:16
  • 6 Web App Security
    52:42
  • 7 Lab Setup
    56:25
  • 8 Lab Practice
    40:25
  • 9 Hacking With Git
    48:46
  • 10 CTF Challenge
    04:48
  • 11 CTF Challenge Part 2
    15:32
  • 12 Bug Bounty Lab WP Hacking
    25:54
  • 13 IDOR & Broken Access Control
    45:17
  • 14 IDOR & Path Traversal Part – 1
    57:00
  • 14 IDOR & Path Traversal Part – 2
    07:45
  • 15 Path Traversal Bypass & OWASP
    31:36
  • 16 XSS Attack & OS Command Injection
    01:01:10
  • 17 CTF Advance
    35:29
  • 18 CSRF
    25:48
  • 19 DOM XSS & OAuth
    53:41
  • 20 SQL Injection
    22:22
  • 21 Blind SQL Injection & SSRF
    01:34:03
  • 22 Request Smuggling
    01:20:03
  • 23 File Upload Vulnerability
    28:55
  • 24 RCE & Job Placement Assistance
    37:17
  • 25 What Next
    15:20

Earn a certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template