π’ ΩΩΨ±Ψ³ Ψ¨Ψ§ΩΨΉΨ±Ψ¨Ω ΩΩ Ω
Ψ¬Ψ§Ω Bug Bounty Hunter π₯
12 Ψ³Ψ§ΨΉΩ Ψ΄Ψ±Ψ ΩΩ Ψ§ΩΩΨ§ΨΉ Ψ§ΩΨ«ΨΊΨ±Ψ§Ψͺ β¨
Enumeration
important things
NMAP
Sub domain take over
Burte forcing
Upload File
Html injection
SQL injection
Cross-site request forgery(csrf)
Click Jacking
Cross Site Scripting (XSS)
File Inclusion(LFI+RFI)
IDOR
Information disclosure
Parameter tempring
No limit rate
Open redirection
XML External Entity (XXE)
Cross-origin resource sharing(CORS)
Server-side request forgery(ssrf)
code Injection
ΩΩΨͺΨ³Ψ¬ΩΩ ΩΨ§ΩΩ Ψ΄Ψ§ΩΨ―Ω Ω Ψ¬Ψ§ΩΨ§ πβ€οΈ
https://hunters-zone.com/courses/bug-bounty-hunter
@hackership π€³
12 Ψ³Ψ§ΨΉΩ Ψ΄Ψ±Ψ ΩΩ Ψ§ΩΩΨ§ΨΉ Ψ§ΩΨ«ΨΊΨ±Ψ§Ψͺ β¨
Enumeration
important things
NMAP
Sub domain take over
Burte forcing
Upload File
Html injection
SQL injection
Cross-site request forgery(csrf)
Click Jacking
Cross Site Scripting (XSS)
File Inclusion(LFI+RFI)
IDOR
Information disclosure
Parameter tempring
No limit rate
Open redirection
XML External Entity (XXE)
Cross-origin resource sharing(CORS)
Server-side request forgery(ssrf)
code Injection
ΩΩΨͺΨ³Ψ¬ΩΩ ΩΨ§ΩΩ Ψ΄Ψ§ΩΨ―Ω Ω Ψ¬Ψ§ΩΨ§ πβ€οΈ
https://hunters-zone.com/courses/bug-bounty-hunter
@hackership π€³
π₯3