Open Site Navigation

Bug Bounty Hunting

Bug Bounty programs are for researchers and cybersecurity professionals to test their skills on a variety of targets online and get paid if they find any vulnerabilities in the application. It is a penetration testing program that rewards for finding bugs and ways to exploit. Cyber Security is next Big thing. There are many people who are learning how to develop web application and yet only a few are learning to secure those applications. This course is designed so that you can learn to secure web applications even if you don't know how to design or develop a web app.

Bug Bounty Hunting

Course Modules


  • Basic Network Terminologies
  • Virtualisation & OS Setup
  • Server & Linux Basics
  • Introduction to HTML, Python & Webhosting
  • Information Gathering & Social Reconnaissance
  • Introduction to Bug Crowd & Hackerone
  • Vulnerability Analysis
  • Penetration testing Vs Bug Bounty
  • OWASP Test Cases Check List
  • Vulnerability Rating Taxonomy (VRT)
  • SANS Top25 Applications Errors
  • OWASP CWE Vulnerabilities
  • Common Attack Pattern Enumeration and Classification(CAPEC)
  • Common Vulnerabilities & Exposures (CVE) rating


  • Spidering - Scanning websites and web applications
  • Investigating web security
  • Advanced manual tools
  • Module - Repeater | Intruder | Decoder | Comparer
  • Burpsuite Collaborator Client
  • Burpsuite Clickbandi

TEST CASE - Enumeration

Sensitive Data Disclosure from GitHub, Google & other listings

  • Identifying Web Technologies & Frameworks
  • Map out the target
  • Website based enumeration
  • Tool based enumeration
  • Public disclosure
  • Hunt for Sensitive Directories
  • Subdomain Analysis

TEST CASE - Common Low Priority Bugs

  • Clickjacking
  • Missing SPF/DMARC Record
  • Open Redirection
  • Lack of Email Notification & Verification
  • Mail Server Misconfiguration
  • Missing HTTP Only Cookie Flag
  • No Rate Limiting
  • Captcha Bypass
  • Missing Authentication
  • Parameter Pollution

TEST CASE - Access Control Issues

  • Path traversal
  • Information Disclosure
  • Information Exposure Through an Error Message
  • Information Exposure Through Debug Information
  • Privilege Escalation
  • Improper Access Control
  • Improper Authentication
  • Disallowed Robots file Access

TEST CASE - Sensitive Data Exposure

  • Internal IP Disclosure
  • Path Disclosure
  • Token Disclosure in URL
  • EXIF Geolocation Data
  • User Enumeration
  • Server Configuration
  • Private API key Disclosure
  • Sensitive Configuration Files

TEST CASE - Authorization & Authentication

  • Improper Authorization & Authentication
  • Insufficient Session Expiration & Session Fixation
  • Issues with OAuth Redirection & Permissions
  • Insecure Direct Object Reference (IDOR)
  • Misconfigured Login pages
  • Bypass Single factor & Two factor Authentication
  • Account Take Over
  • Account Lockout
  • Cross Site Request Forgery (CSRF)
  • Server Side Request Forgery (SSRF)
  • DNS Zone Transfer

TEST CASE - Encryption Flaws

  • Improper Certificate Validation
  • Cleartext Transmission of Session Token
  • Encrypted Cookies
  • Cleartext Storage of Sensitive Information
  • Missing Encryption of Sensitive Data
  • Cryptographic Issue (Generic)

TEST CASE - Injection

  • Client-Side Template Injection
  • Server-Side Template Injection
  • SQL Injection
  • OS Command Injection
  • XML Injection
  • PHP Code Injection
  • HTML Injection

TEST CASE - High Risk Bugs

  • Cross site scripting
  • JSONHijacking
  • Wordpress | Joomla | Drupal Bugs
  • CMS Vulnerability Analysis
  • Remote Code Execution
  • Critical File Found
  • File Inclusion (LFI /RFI)
  • File Upload Vulnerabilities
  • Directory Traversal
  • CORS
  • Script Source Code Disclosure
  • HTTP Parameter Pollution Attack
  • Subdomain Takeover
  • Documenting & Reporting Vulnerability

Duration of the courses: 50 Hours


Candidates who are interested to learn about web applications and security, who are interested to become a bug bounty hunter, web developers, ethical hackers and pentesters.

Key Benefits

  • Reporting and listing of Bugs

  • Understanding latest techniques to find loopholes in websites and web application

  • Practical attacks on networks, websites and Web Applications and ways to tackle them.

  • Submit atleast one bug report in major platforms (Bugcrowd, Hackerone, etc)