Bug Bounty Course
Bug Bounty Course
Penetration Testing
Training
www.ignitetechnologies.in
ABOUT
Well-Known Entity for Offensive Security
{Training and Services}
About us
With an outreach to over a million students
and over thousand colleges, Ignite Technologies stood out to be
a trusted brand in cyber security training and services
WHO
CAN
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and WHY
Practitioners
Site administrators
Level up each candidate by providing the
Technical support engineer
fundamental knowledge required to begin the
Senior systems engineer
Sessions.
Systems analyst or administrator
Hands-on Experience for all Practical
IT security specialist, analyst, manager,
Sessions.
Architect, or administrator
Get Course PDF and famous website links for
IT security officer, auditor, or engineer
content and Tools
Network specialist, analyst, manager,
Customized and flexible training schedule.
Architect, consultant, or administrator
Get recorded videos after the session for each
participant.
Get post-training assistance and backup
sessions.
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
Web Pentest
Web Pentest program, also known as the Bug Bounty program,
is a crowdsourcing initiative hosted by organizations to give a platform to
security researchers and white hat hackers from across the globe to
showcase their skills and discover any security holes in their infrastructure.
Depending upon the severity level of the bug report and the details
presented within the Proof of Concept (POC), they are either rewarded
with remuneration or recognition as a token of appreciation.
While a large majority of the bug bounty programs are public, certain are
private events and are strictly invite-based. Such programs have stringent
terms and conditions that the invitees must always abide by
Prerequisites
In order to initiate the Bug Bounty Training, you should be
aware of the basic concepts of the development web applications; frontend
and backend.
Type 2
A PERSONALIZED SESSIONS will be
a one-on-one session.
Pros: Flexible slot as per candidate availability.
Type 2
A CUSTOMIZED PERSONALIZED session will be a
one-on-one session that can be fine-tuned as per the
Candidate's requirement.
Pros:
• Flexible slot as per candidate availabilities
• Including Live Website Testing
What
You Will Achieve?
OUR FOCUS
• Level up all candidates from the various domains to make the
curriculum cohesive.
Introduction
• Introduction Web Servers & Web Applications
• The Bug Bounty Program
• Web Application Penetration Testing & its Methodologies
• Introduction to HTTP Protocol
• OWASP & its Top 10
• Introduction to Burp Suite
Cryptography
• Check SSL Version, Algorithms, Key Length
• Check For Digital Certificate Validity (Duration, Signature And Cn)
• Check Credentials Only Delivered Over Https
• Check That The Login Form Is Delivered Over Https
• Check Session Tokens Only Delivered Over Https
• Check If Http Strict Transport Security (HSTS) In Use
Authentication
• What is Authentication?
• HTTP Authentication Exploitation
• Introduction to Broken Authentication
• Broken Authentication Exploitation.
• Test For User Enumeration
• Test For Brute force Protection
• Test For Default Logins
• Test Password Reset and/or Recovery
• Test Password Change Process
• Test CAPTCHA
• Test Password Quality Rules
• Test For Autocomplete on Password Forms/Input
• Mitigation Steps
Session Management
• What are Sessions and Cookies?
• Introduction to Session Management
• Check session tokens for cookie flags
• Check session cookie duration
• Test session cookies for randomness
• Insecure Session Exploitation
• Mitigation Steps
SQL Injection
• What are Databases?
• Introduction to SQL Injection
• SQL Injection Error Based
• SQL Injection via SQLmap
• Manual SQL Exploitation
• Boolean Based Exploitation
• SQL Injection Form Based Exploitation
• Authentication Bypass
• Remote Code Execution with SQLmap
• Mitigation Steps
XXE Injection
• Introduction to XML
• Introduction to XXE Injection
• XXE for SSRF
• XXE Billion Laugh Attack
• XXE Exploitation
• Blind XXE
• Mitigation Steps
CONTACT US
Phone No.
+91 9599 387 41 | +91 1145 1031 30
WhatsApp
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
[email protected]
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/ignitetechnologies