ABOUT THIS COURSE
121 LESSONS
Learn advanced techniques to identify and exploit vulnerabilities in web applications.

COURSE CURRICULUM

Section 1: Introduction lock icon Created with Sketch.

Section 2: The Intricacies of Bug Bounties lock icon Created with Sketch.

Section 3: Main App Methodology lock icon Created with Sketch.

Section 4: Broad Scope Methodology lock icon Created with Sketch.

Section 5: Attack Techniques: CSRF lock icon Created with Sketch.

Section 6: Attack Technique: Open Redirect lock icon Created with Sketch.

Section 7: Attack Technique: Intro to JWT lock icon Created with Sketch.

Section 8: Attack Techniques: CAPTCHA Bypass lock icon Created with Sketch.

Section 9: Attack Techniques - Broken Access Control lock icon Created with Sketch.

Section 10: Attack Techniques: IDOR by Uncle Rat lock icon Created with Sketch.

Section 11: Attack Techniques - Business Logic flaws lock icon Created with Sketch.

Section 12: Attack Techniques- File Inclusions by PinkDraconian lock icon Created with Sketch.

Section 13: Attack Techniques - SQLi by PinkDraconian lock icon Created with Sketch.

Section 14: Attack Techniques - XXE lock icon Created with Sketch.

Section 15: XXE According to OWASP (optional) lock icon Created with Sketch.

Section 16: Attack Techniques - Xpath Injection lock icon Created with Sketch.

Section 17: Attack Techniques - Template Injections lock icon Created with Sketch.

Section 18: Attack Techniques - XSS lock icon Created with Sketch.

Section 19: Attack Techniques: Insecure Deserilisation lock icon Created with Sketch.

Section 20: CSP - Content security protection AKA why is my JS not executing? lock icon Created with Sketch.

Section 21: Attack Techniques - SSRF lock icon Created with Sketch.

Section 22: Attach Techniques - OS command Injection lock icon Created with Sketch.

Section 23: Attack Techniques - WAF Evasion Technique lock icon Created with Sketch.

Section 24: Attack Techniques - HTTP Parameter Pollution lock icon Created with Sketch.

Section 25: Using Postman to Hack APIs lock icon Created with Sketch.

Section 26: Practice: Let's Build Some APIs to hack lock icon Created with Sketch.

Section 27: Tools lock icon Created with Sketch.

Section 28: Burp Suite Practical Examples lock icon Created with Sketch.

Section 29: Reporting lock icon Created with Sketch.

Section 30: What Now? lock icon Created with Sketch.

Section 31: CheesyLabs lock icon Created with Sketch.

Section 32: Master Labs lock icon Created with Sketch.

Join the NetworkChuck Academy
Unlock this course, plus get access to our library of over 14 courses and 700 in-depth lessons ($199 value) by becoming a Premium member today.

NetworkChuck
Academy Perks

$12/mo

Monthly Membership

  • 14+ on-demand courses at your fingertips
  • OverĀ 700+ educational lessons
  • 195+ hours of expert content

$6/mo ($72 Billed Annually)

Annual Membership

  • 14+ on-demand courses at your fingertips
  • OverĀ 700+Ā educational lessons
  • 195+ hours of expert content
  • Special perks coming soon