bug bounty part-1

 BUG BOUNTY INTRODUCTION

Bug bounty is splitted into 3 types in our curiculmn

  • Network Bug bounty
  • Web Bug bounty
  • App Bug Bounty
----------------------------------------------------------------------------------------------------------------------
Network bug Bounty
 In this blog we learn the course attack that we teach is given here


In network bug bounty,we learn internal attacks,various kind of actional attack
where as in web bug bounty we learn database attack like sql injection attack,
cross-site scripting attack,cross-site request foregery attack ,buffer over flow attack,
Denial of service(Dos)attack.finally last section of app bug bounty which you learn about 
gather information about the android phone.android pentesting knowledge.these are the major things we learn

tips to keep in mind while learning bug bounty

  • take a short
  • perform practicals in vms(keep away main os from viruses)
  • practise the tools day by day to get good knowledge in them



Comments

Popular posts from this blog

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

PlayItSafe google cyber security professional course 2 (COURSERA)

BITFLIPING

AUTOMATED SCRIPT FOR FINDING XSS

BEGINNER BUG BOUNTY TOOLS PART-1

The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.

Things should do after sublister(sublist3r)

BEGINNER BUG BOUNTY TOOLS PART 2

how hackers do a phishing page in 8 lines of code using html