资源详情

返回首页 | 相关搜索
Udemy - Learn Bug Bounty Hunting & Web Security Testing From Scratch (1.2025)
大小 5.25 GB
文件数 205
Info Hash: 4069005E6081FB9DEA306FE6496EC7A67376B941
收录时间 2026-03-08 05:55:16
更新时间 2026-03-08 05:55:16
文件列表 (205)
01. Introduction To Bug Bounty Hunting/1. Course Introduction.mp4
19.64 MB
01. Introduction To Bug Bounty Hunting/1. Course Introduction.vtt
4.44 KB
01. Introduction To Bug Bounty Hunting/2. Introduction to Bug Hunting.mp4
12.66 MB
01. Introduction To Bug Bounty Hunting/2. Introduction to Bug Hunting.vtt
13.1 KB
01. Introduction To Bug Bounty Hunting/3. What is a Website.mp4
14.07 MB
01. Introduction To Bug Bounty Hunting/3. What is a Website.vtt
9.63 KB
02. Information Disclosure vulnerabilities/1. Information Disclosure slides.pdf
231.21 KB
02. Information Disclosure vulnerabilities/1. Introduction to Information Disclosure Vulnerabilities.mp4
40.49 MB
02. Information Disclosure vulnerabilities/1. Introduction to Information Disclosure Vulnerabilities.vtt
2.76 KB
02. Information Disclosure vulnerabilities/2. Discovering Database Login Credentials.mp4
87.31 MB
02. Information Disclosure vulnerabilities/2. Discovering Database Login Credentials.vtt
15.4 KB
02. Information Disclosure vulnerabilities/3. Discovering Endpoints & Sensitive Data.mp4
77.19 MB
02. Information Disclosure vulnerabilities/3. Discovering Endpoints & Sensitive Data.vtt
11.56 KB
02. Information Disclosure vulnerabilities/4. Introduction to HTTP Status Codes.mp4
45.27 MB
02. Information Disclosure vulnerabilities/4. Introduction to HTTP Status Codes.vtt
11.7 KB
02. Information Disclosure vulnerabilities/5. Employing the Hacker Bug Hunter Mentality to Discover Admin Login Information.mp4
85.85 MB
02. Information Disclosure vulnerabilities/5. Employing the Hacker Bug Hunter Mentality to Discover Admin Login Information.vtt
12.1 KB
02. Information Disclosure vulnerabilities/6. Manipulating Application Behaviour Through the HTTP POST Method.mp4
51.56 MB
02. Information Disclosure vulnerabilities/6. Manipulating Application Behaviour Through the HTTP POST Method.vtt
10.37 KB
02. Information Disclosure vulnerabilities/7. Manipulating Application Behaviour Through the HTTP GET Method.mp4
70.9 MB
02. Information Disclosure vulnerabilities/7. Manipulating Application Behaviour Through the HTTP GET Method.vtt
8.55 KB
02. Information Disclosure vulnerabilities/8. Intercepting Requests With Burp Proxy.mp4
82.73 MB
02. Information Disclosure vulnerabilities/8. Intercepting Requests With Burp Proxy.vtt
15.15 KB
03. Broken Access Control Vulnerabilities/1. Broken Access Control slides.pdf
782.24 KB
03. Broken Access Control Vulnerabilities/1. Introduction to Broken Access Control Vulnerabilities.mp4
25.9 MB
03. Broken Access Control Vulnerabilities/1. Introduction to Broken Access Control Vulnerabilities.vtt
1.51 KB
03. Broken Access Control Vulnerabilities/2. Cookie Manipulation.mp4
81.12 MB
03. Broken Access Control Vulnerabilities/2. Cookie Manipulation.vtt
12.17 KB
03. Broken Access Control Vulnerabilities/3. Accessing Private User Data.mp4
52.95 MB
03. Broken Access Control Vulnerabilities/3. Accessing Private User Data.vtt
10.46 KB
03. Broken Access Control Vulnerabilities/4. Discovering IDOR Vulnerabilities (Insecure Direct Object Reference).mp4
68.45 MB
03. Broken Access Control Vulnerabilities/4. Discovering IDOR Vulnerabilities (Insecure Direct Object Reference).vtt
12.97 KB
03. Broken Access Control Vulnerabilities/5. Privilege Escalation with Burp Repeater.mp4
33.25 MB
03. Broken Access Control Vulnerabilities/5. Privilege Escalation with Burp Repeater.vtt
13.39 KB
03. Broken Access Control Vulnerabilities/6. Debugging Flows with HTTP TRACE & Gaining Admin Access!.mp4
60.46 MB
03. Broken Access Control Vulnerabilities/6. Debugging Flows with HTTP TRACE & Gaining Admin Access!.vtt
11.42 KB
04. Path Directory Traversal Vulnerabilities/1. Introduction to Path Traversal Vulnerabilities & Basic Discovery.mp4
84.3 MB
04. Path Directory Traversal Vulnerabilities/1. Introduction to Path Traversal Vulnerabilities & Basic Discovery.vtt
14.3 KB
04. Path Directory Traversal Vulnerabilities/1. Path Traversal slides.pdf
281.97 KB
04. Path Directory Traversal Vulnerabilities/2. Bypassing Absolute Path Restriction.mp4
37.87 MB
04. Path Directory Traversal Vulnerabilities/2. Bypassing Absolute Path Restriction.vtt
7.26 KB
04. Path Directory Traversal Vulnerabilities/3. Bypassing Hard-coded Extensions.mp4
34.25 MB
04. Path Directory Traversal Vulnerabilities/3. Bypassing Hard-coded Extensions.vtt
6.43 KB
04. Path Directory Traversal Vulnerabilities/4. Bypassing Filtering.mp4
34.74 MB
04. Path Directory Traversal Vulnerabilities/4. Bypassing Filtering.vtt
6.18 KB
04. Path Directory Traversal Vulnerabilities/5. Bypassing Hard-coded Paths.mp4
37.72 MB
04. Path Directory Traversal Vulnerabilities/5. Bypassing Hard-coded Paths.vtt
6.6 KB
04. Path Directory Traversal Vulnerabilities/6. Bypassing Advanced Filtering.mp4
43.47 MB
04. Path Directory Traversal Vulnerabilities/6. Bypassing Advanced Filtering.vtt
8.75 KB
04. Path Directory Traversal Vulnerabilities/7. Bypassing Extreme Filtering.mp4
63.68 MB
04. Path Directory Traversal Vulnerabilities/7. Bypassing Extreme Filtering.vtt
12.11 KB
04. Path Directory Traversal Vulnerabilities/7. directory-traversal-cheatsheet.txt
5.53 KB
05. CSRF - Cross-Site Request Forgery/1. CSRF slides.pdf
249.72 KB
05. CSRF - Cross-Site Request Forgery/1. Discovering & Exploiting CSRF Vulnerabilities.mp4
107.45 MB
05. CSRF - Cross-Site Request Forgery/1. Discovering & Exploiting CSRF Vulnerabilities.vtt
10.54 KB
06. OAUTH 2.0 Vulnerabilities/1. Introduction to OAUTH 2.0.mp4
48.66 MB
06. OAUTH 2.0 Vulnerabilities/1. Introduction to OAUTH 2.0.vtt
6.35 KB
06. OAUTH 2.0 Vulnerabilities/1. OAUTH 2.0 slides.pdf
598.93 KB
06. OAUTH 2.0 Vulnerabilities/2. OAUTH 2.0 Basic Exploitation.mp4
71.7 MB
06. OAUTH 2.0 Vulnerabilities/2. OAUTH 2.0 Basic Exploitation.vtt
14.26 KB
06. OAUTH 2.0 Vulnerabilities/3. Exploiting a Linking OAUTH 2.0 Flow Through CSRF.mp4
33.36 MB
06. OAUTH 2.0 Vulnerabilities/3. Exploiting a Linking OAUTH 2.0 Flow Through CSRF.vtt
17.48 KB
06. OAUTH 2.0 Vulnerabilities/4. Exploiting a Login OAUTH 2.0 Flow Through CSRF.mp4
138.89 MB
06. OAUTH 2.0 Vulnerabilities/4. Exploiting a Login OAUTH 2.0 Flow Through CSRF.vtt
18.27 KB
07. Injection Vulnerabilities/1. Introduction to Injection Vulnerabilities.mp4
29.9 MB
07. Injection Vulnerabilities/1. Introduction to Injection Vulnerabilities.vtt
1.66 KB
08. OS Command Injection/1. Command Injection slides.pdf
207.57 KB
08. OS Command Injection/1. Discovering a Basic Command Injection Vulnerability.mp4
72.04 MB
08. OS Command Injection/1. Discovering a Basic Command Injection Vulnerability.vtt
11.57 KB
08. OS Command Injection/2. Discovering Blind Command Injection Vulnerabilities.mp4
82.3 MB
08. OS Command Injection/2. Discovering Blind Command Injection Vulnerabilities.vtt
13.42 KB
08. OS Command Injection/3. Discovering Asynchronous Blind Command Injection Vulnerabilities.mp4
64.74 MB
08. OS Command Injection/3. Discovering Asynchronous Blind Command Injection Vulnerabilities.vtt
11.58 KB
08. OS Command Injection/4. Using Burp Collaborator to Exploit Asynchronous Blind Command Injection.mp4
39.36 MB
08. OS Command Injection/4. Using Burp Collaborator to Exploit Asynchronous Blind Command Injection.vtt
7.28 KB
09. XSS - Cross Site Scripting/1. Introduction to XSS Vulnerabilities & Its Types.mp4
10.87 MB
09. XSS - Cross Site Scripting/1. Introduction to XSS Vulnerabilities & Its Types.vtt
6.03 KB
09. XSS - Cross Site Scripting/1. XSS slides.pdf
668.91 KB
09. XSS - Cross Site Scripting/2. Discovering a HTML Injection Vulnerability.mp4
42.77 MB
09. XSS - Cross Site Scripting/2. Discovering a HTML Injection Vulnerability.vtt
7.81 KB
09. XSS - Cross Site Scripting/3. Discovering Reflected & Stored XSS Vulnerabilities.mp4
36.82 MB
09. XSS - Cross Site Scripting/3. Discovering Reflected & Stored XSS Vulnerabilities.vtt
8.16 KB
10. DOM XSS Vulnerabilities/1. Introduction to DOM XSS Vulnerabilities.mp4
20.95 MB
10. DOM XSS Vulnerabilities/1. Introduction to DOM XSS Vulnerabilities.vtt
8.32 KB
10. DOM XSS Vulnerabilities/2. Discovering a Reflected DOM XSS in a Link.mp4
24.6 MB
10. DOM XSS Vulnerabilities/2. Discovering a Reflected DOM XSS in a Link.vtt
8.16 KB
10. DOM XSS Vulnerabilities/3. Discovering a Reflected XSS in an Image Tag!.mp4
19.35 MB
10. DOM XSS Vulnerabilities/3. Discovering a Reflected XSS in an Image Tag!.vtt
6.8 KB
10. DOM XSS Vulnerabilities/4. Injecting Javascript Directly in a Page Script.mp4
19.83 MB
10. DOM XSS Vulnerabilities/4. Injecting Javascript Directly in a Page Script.vtt
10.35 KB
10. DOM XSS Vulnerabilities/5. Discovering XSS in a Drop-down Menu.mp4
37.2 MB
10. DOM XSS Vulnerabilities/5. Discovering XSS in a Drop-down Menu.vtt
6.79 KB
10. DOM XSS Vulnerabilities/6. Discovering XSS in AngularJS Application.mp4
14.09 MB
10. DOM XSS Vulnerabilities/6. Discovering XSS in AngularJS Application.vtt
6.42 KB
11. XSS - Bypassing Security/1. Bypassing Single-Quotes Filtering.mp4
96.84 MB
11. XSS - Bypassing Security/1. Bypassing Single-Quotes Filtering.vtt
11.7 KB
11. XSS - Bypassing Security/2. Bypassing Advanced Filtering.mp4
64.04 MB
11. XSS - Bypassing Security/2. Bypassing Advanced Filtering.vtt
15.46 KB
11. XSS - Bypassing Security/3. Bypassing Server-Side Filtering.mp4
25.82 MB
11. XSS - Bypassing Security/3. Bypassing Server-Side Filtering.vtt
9.85 KB
11. XSS - Bypassing Security/4. Bypassing Extreme Filtering with Burp Intruder.mp4
23.74 MB
11. XSS - Bypassing Security/4. Bypassing Extreme Filtering with Burp Intruder.vtt
13.38 KB
12. Bypassing Content Security Policy (CSP)/1. Analysing the Target Application.mp4
23.13 MB
12. Bypassing Content Security Policy (CSP)/1. Analysing the Target Application.vtt
9.44 KB
12. Bypassing Content Security Policy (CSP)/2. Bypassing Basic Filtering.mp4
43.57 MB
12. Bypassing Content Security Policy (CSP)/2. Bypassing Basic Filtering.vtt
9.59 KB
12. Bypassing Content Security Policy (CSP)/3. Discovering an XSS in a CSP Enabled Application.mp4
100.79 MB
12. Bypassing Content Security Policy (CSP)/3. Discovering an XSS in a CSP Enabled Application.vtt
11.71 KB
13. SQL Injection Vulnerabilities/1. Introduction to SQL Injection Vulnerabilities.mp4
105.11 MB
13. SQL Injection Vulnerabilities/1. Introduction to SQL Injection Vulnerabilities.vtt
11.25 KB
13. SQL Injection Vulnerabilities/1. SQLi slides.pdf
271.93 KB
13. SQL Injection Vulnerabilities/2. Discovering SQL Injections.mp4
122.85 MB
13. SQL Injection Vulnerabilities/2. Discovering SQL Injections.vtt
10.8 KB
13. SQL Injection Vulnerabilities/3. Bypassing Admin Login Using Logical Operators.mp4
72.85 MB
13. SQL Injection Vulnerabilities/3. Bypassing Admin Login Using Logical Operators.vtt
7.28 KB
13. SQL Injection Vulnerabilities/4. Selecting Data From the Database.mp4
80.73 MB
13. SQL Injection Vulnerabilities/4. Selecting Data From the Database.vtt
10.99 KB
13. SQL Injection Vulnerabilities/5. Accessing The Database Admin Records.mp4
66.7 MB
13. SQL Injection Vulnerabilities/5. Accessing The Database Admin Records.vtt
8.8 KB
14. Blind SQL Injections/1. Discovering Blind SQL Injections.mp4
44.67 MB
14. Blind SQL Injections/1. Discovering Blind SQL Injections.vtt
9.19 KB
14. Blind SQL Injections/2. Enumerating Table & Column Names.mp4
23.57 MB
14. Blind SQL Injections/2. Enumerating Table & Column Names.vtt
14.28 KB
14. Blind SQL Injections/3. Recovering Administrator Password With Burp Intruder.mp4
45.85 MB
14. Blind SQL Injections/3. Recovering Administrator Password With Burp Intruder.vtt
11.45 KB
14. Blind SQL Injections/4. Using the Cluster-Bomb Attack to Recover Passwords.mp4
48.89 MB
14. Blind SQL Injections/4. Using the Cluster-Bomb Attack to Recover Passwords.vtt
10.21 KB
15. Time-Based Blind SQL Injection/1. Discovering Time-Based Blind SQLi.mp4
65.14 MB
15. Time-Based Blind SQL Injection/1. Discovering Time-Based Blind SQLi.vtt
12.77 KB
15. Time-Based Blind SQL Injection/2. Extracting Data From the Database Using a Time-Based Blind SQLi.mp4
111.28 MB
15. Time-Based Blind SQL Injection/2. Extracting Data From the Database Using a Time-Based Blind SQLi.vtt
15.88 KB
15. Time-Based Blind SQL Injection/3. Getting The Admin Password Using a Time-Based Blind SQLi.mp4
105.26 MB
15. Time-Based Blind SQL Injection/3. Getting The Admin Password Using a Time-Based Blind SQLi.vtt
15.02 KB
16. SSRF (Server-Side Request Forgery)/1. Introduction to SSRF Vulnerabilities.mp4
17.69 MB
16. SSRF (Server-Side Request Forgery)/1. Introduction to SSRF Vulnerabilities.vtt
951 B
16. SSRF (Server-Side Request Forgery)/1. SSRF slides.pdf
989.72 KB
16. SSRF (Server-Side Request Forgery)/2. Theory Behind SSRF Vulnerabilities & Their Impact.mp4
19.9 MB
16. SSRF (Server-Side Request Forgery)/2. Theory Behind SSRF Vulnerabilities & Their Impact.vtt
10.01 KB
16. SSRF (Server-Side Request Forgery)/3. Discovering a Basic SSRF Vulnerability.mp4
58.15 MB
16. SSRF (Server-Side Request Forgery)/3. Discovering a Basic SSRF Vulnerability.vtt
7.18 KB
16. SSRF (Server-Side Request Forgery)/4. Accessing Private (Admin) Resources Using an SSRF Vulnerability.mp4
76.97 MB
16. SSRF (Server-Side Request Forgery)/4. Accessing Private (Admin) Resources Using an SSRF Vulnerability.vtt
9.02 KB
17. SSRF - Advanced Exploitation/1. Advanced SSRF Discovery.mp4
63.12 MB
17. SSRF - Advanced Exploitation/1. Advanced SSRF Discovery.vtt
8 KB
17. SSRF - Advanced Exploitation/2. Scanning & Mapping Internal Network & Services.mp4
60.14 MB
17. SSRF - Advanced Exploitation/2. Scanning & Mapping Internal Network & Services.vtt
10.91 KB
18. SSRF - Bypassing Security/1. Bypassing Blacklists.mp4
74.59 MB
18. SSRF - Bypassing Security/1. Bypassing Blacklists.vtt
12.82 KB
18. SSRF - Bypassing Security/2. Bypassing Whitelists.mp4
78.03 MB
18. SSRF - Bypassing Security/2. Bypassing Whitelists.vtt
14.06 KB
18. SSRF - Bypassing Security/3. Chaining Open Redirection with SSRF to Bypass Restrictive Filters.mp4
78.71 MB
18. SSRF - Bypassing Security/3. Chaining Open Redirection with SSRF to Bypass Restrictive Filters.vtt
9.64 KB
19. Blind SSRF Vulnerabilities/1. Introduction to Blind SSRF Vulnerabilities.mp4
74.46 MB
19. Blind SSRF Vulnerabilities/1. Introduction to Blind SSRF Vulnerabilities.vtt
5.65 KB
19. Blind SSRF Vulnerabilities/2. Discovering Blind SSRF Vulnerabilities.mp4
76.42 MB
19. Blind SSRF Vulnerabilities/2. Discovering Blind SSRF Vulnerabilities.vtt
9.32 KB
19. Blind SSRF Vulnerabilities/3. Exploiting Blind SSRF Vulnerabilities.mp4
71.26 MB
19. Blind SSRF Vulnerabilities/3. Exploiting Blind SSRF Vulnerabilities.vtt
10.95 KB
19. Blind SSRF Vulnerabilities/4. Escalating Blind SSRF to a Remote Code Execution (RCE).mp4
109.23 MB
19. Blind SSRF Vulnerabilities/4. Escalating Blind SSRF to a Remote Code Execution (RCE).vtt
10.94 KB
20. XXE (XML External Entity) Injection/1. Introduction to XXE Injection Vulnerabilities.mp4
17.71 MB
20. XXE (XML External Entity) Injection/1. Introduction to XXE Injection Vulnerabilities.vtt
1.2 KB
20. XXE (XML External Entity) Injection/1. XXE slides.pdf
636.09 KB
20. XXE (XML External Entity) Injection/2. What is XML.mp4
8.5 MB
20. XXE (XML External Entity) Injection/2. What is XML.vtt
4.55 KB
20. XXE (XML External Entity) Injection/3. Exploiting a Basic XXE Injection.mp4
59.63 MB
20. XXE (XML External Entity) Injection/3. Exploiting a Basic XXE Injection.vtt
11.63 KB
20. XXE (XML External Entity) Injection/4. Discovering an SSRF Through a Blind XXE.mp4
42.92 MB
20. XXE (XML External Entity) Injection/4. Discovering an SSRF Through a Blind XXE.vtt
8.59 KB
21. 2 Hour Live Bug Hunting !/1. 2 Hour Live Bug Hunt Introduction.mp4
37.64 MB
21. 2 Hour Live Bug Hunting !/1. 2 Hour Live Bug Hunt Introduction.vtt
2.61 KB
21. 2 Hour Live Bug Hunting !/1. Live bug hunting slides.pdf
446.09 KB
21. 2 Hour Live Bug Hunting !/10. Discovering an IDOR - Insecure Direct Object Reference.mp4
24 MB
21. 2 Hour Live Bug Hunting !/10. Discovering an IDOR - Insecure Direct Object Reference.vtt
5.35 KB
21. 2 Hour Live Bug Hunting !/11. Discovering Hidden Endpoints Using Regex.mp4
77.57 MB
21. 2 Hour Live Bug Hunting !/11. Discovering Hidden Endpoints Using Regex.vtt
16.89 KB
21. 2 Hour Live Bug Hunting !/12. Discovering a Complex Stored XSS.mp4
73.04 MB
21. 2 Hour Live Bug Hunting !/12. Discovering a Complex Stored XSS.vtt
18.74 KB
21. 2 Hour Live Bug Hunting !/13. Discovering Bugs in Hidden Elements.mp4
96.46 MB
21. 2 Hour Live Bug Hunting !/13. Discovering Bugs in Hidden Elements.vtt
14.9 KB
21. 2 Hour Live Bug Hunting !/14. Discovering Bugs in Hidden Parameters.mp4
66.87 MB
21. 2 Hour Live Bug Hunting !/14. Discovering Bugs in Hidden Parameters.vtt
11.45 KB
21. 2 Hour Live Bug Hunting !/2. Overview of the Target.mp4
46.91 MB
21. 2 Hour Live Bug Hunting !/2. Overview of the Target.vtt
15.07 KB
21. 2 Hour Live Bug Hunting !/3. Discovering an Open Redirect Vulnerability.mp4
15.75 MB
21. 2 Hour Live Bug Hunting !/3. Discovering an Open Redirect Vulnerability.vtt
10.06 KB
21. 2 Hour Live Bug Hunting !/4. Discovering an XSS in the Response.mp4
35.83 MB
21. 2 Hour Live Bug Hunting !/4. Discovering an XSS in the Response.vtt
15.29 KB
21. 2 Hour Live Bug Hunting !/5. Discovering an XSS in a HTML Comment.mp4
92.11 MB
21. 2 Hour Live Bug Hunting !/5. Discovering an XSS in a HTML Comment.vtt
14.9 KB
21. 2 Hour Live Bug Hunting !/6. Discovering an XSS in a Date Picker.mp4
39.9 MB
21. 2 Hour Live Bug Hunting !/6. Discovering an XSS in a Date Picker.vtt
10.75 KB
21. 2 Hour Live Bug Hunting !/7. Broken Access Control in Booking Page.mp4
52.32 MB
21. 2 Hour Live Bug Hunting !/7. Broken Access Control in Booking Page.vtt
9.04 KB
21. 2 Hour Live Bug Hunting !/8. Analysing Application Files & Finding Sensitive Data.mp4
102.91 MB
21. 2 Hour Live Bug Hunting !/8. Analysing Application Files & Finding Sensitive Data.vtt
21.69 KB
21. 2 Hour Live Bug Hunting !/9. Discovering Endpoints Hidden In Code.mp4
36.06 MB
21. 2 Hour Live Bug Hunting !/9. Discovering Endpoints Hidden In Code.vtt
6.68 KB
22. Participating in Bug Bounty Programs/1. Hacker1 Overview.mp4
71.89 MB
22. Participating in Bug Bounty Programs/1. Hacker1 Overview.vtt
20.59 KB
22. Participating in Bug Bounty Programs/2. Bug-Bounty Overview.mp4
46.21 MB
22. Participating in Bug Bounty Programs/2. Bug-Bounty Overview.vtt
14.29 KB
22. Participating in Bug Bounty Programs/3. Submitting a Bug Report.mp4
33.48 MB
22. Participating in Bug Bounty Programs/3. Submitting a Bug Report.vtt
16.83 KB
23. Bonus Section/1. Bonus Lecture - What's next.html
12.69 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。