By Dawid Czagan, Top 10 Hacker at HackerOne
Web Hacking Secrets: How to Hack Legally and Earn Thousands of Dollars at HackerOne
What you will learn
- Master web application security testing
- Become a successful bug hunter
- Go from zero to thousands of dollars at HackerOne
- Double your web hacking rewards with fuzzing
- Learn how hackers earn thousands of dollars per one bug
- Discover how to find these bugs step-by-step in practice (DEMOS)
- Learn from one of the top hackers at HackerOne
Course description
HackerOne is your big opportunity. This is the platform where you can hack legally and at the same time you can make money. You can hack many different companies like Twitter, Yahoo, Uber, Coinbase, and a lot more. And you can get paid for your findings, for example $100, $1,000, or even $10,000 per one bug. It’s just amazing. All you need is Internet connection and knowledge. Yes - you need knowledge to go from zero to thousands of dollars at HackerOne, and in this online training I’m going to share my knowledge with you. I’m one of the top hackers at HackerOne and I know quite a lot about hacking and making money that way. In this self-paced online training I’ll present many award-winning bugs. The more you play with award-winning-bugs the more knowledge you get and the more knowledge you have, the more money you can make. I’ll also discuss a successful bug hunting strategy that I have been using in the recent years. What’s more, I’ll present a lot of demos, because I want you to see how all these things work in practice.
This self-paced online training is composed of 6 different courses:
- Start Hacking and Making Money Today at HackerOne - Keep Hacking and Making Money at HackerOne - Case Studies of Award-Winning XSS Attacks: Part 1 - Case Studies of Award-Winning XSS Attacks: Part 2 - DOUBLE Your Web Hacking Rewards with Fuzzing - How Web Hackers Make BIG MONEY: Remote Code Execution
In the 1st course I will discuss the 5 bugs that I recommend you to start with and I’ll introduce you to the strategy that I have been using successfully for a long time. In the 2nd course, you’ll master the strategy and you’ll play with the next 5 bugs. In the 3rd course I’ll demonstrate award-winning XSS attacks (cross-site scripting). It turns out, that you can get a 4-digit ($$$$) reward per single XSS, but to make it happen you need to learn about non-standard XSS attacks and this is exactly what I’ll present to you. Next, in course No. 4 I’ll demonstrate more award-winning XSS attacks, because I want you to become a professional XSS hunter earning more and and more money. In course No. 5, I will present fuzzing, which is one of the most powerful vulnerability detection techniques, and I’ll show you how you can use this technique to double your web hacking rewards. And finally, I’ll tell you how to make big money with RCE, which stands for remote code execution. This is the most dangerous attack and companies are willing to give you a 5-digit reward ($$$$$) per single RCE, which is just awesome. What you need, to make this amount of money, is knowledge about non-standard RCE attacks and this is what I’ll present to you in course No. 6. You can really go from zero to thousands of dollars at HackerOne. As one of the top hackers at HackerOne I know very well how it works and I want to share my knowledge with you. I want you to become the next successful web hacker and that’s the reason why I created "Web Hacking Secrets: How to Hack Legally and Earn Thousands of Dollars at HackerOne".
Who this course is for:
* Penetration testers * Ethical hackers * Bug hunters * Security engineers / consultants
Requirements
- Basic hacking skills
- Basic understanding of XSS attacks (cross-site scripting)
Related Skills
Course overview - 63
Course #1: Start Hacking and Making Money Today at HackerOne
HackerOne: Your Big Opportunity
Getting Started with 5 Bugs
Automatic Leakage of Password Reset Link - Overview
Automatic Leakage of Password Reset Link - Demo
How to Get Access to the Account of the Logged Out User - Overview
How to Get Access to the Account of the Logged Out User - Demo
Insecure Processing of Credit Card Data - Overview
Insecure Processing of Credit Card Data - Demo
Disclosure of Authentication Cookie - Overview
Disclosure of Authentication Cookie - Demo
User Enumeration: Overview
User Enumeration: Demo
Summary - Start Hacking
Course #2: Keep Hacking and Making Money at HackerOne
How to Impersonate a User via Insecure Log In - Overview
How to Impersonate a User via Insecure Log In - Demo
Sensitive Information in Metadata - Overview
Sensitive Information in Metadata - Demo
Disclosure of Credentials - Overview
Disclosure of Credentials - Demo
Insecure Password Change - Overview
Insecure Password Change - Demo
Dictionary Attack - Overview
Dictionary Attack - Demo
Summary - Keep Hacking
Course #3: Case Studies of Award-Winning XSS Attacks: Part 1
XSS via Image - Overview
XSS via Image - Demo
XSS via HTTP Response Splitting - Overview
XSS via HTTP Response Splitting - Demo
XSS via Cookie - Overview
XSS via Cookie - Demo
XSS via AngularJS Template Injection - Overview
XSS via AngularJS Template Injection - Demo
Summary - XSS Attacks Part 1
Course #4: Case Studies of Award-Winning XSS Attacks: Part 2
XSS via XML - Overview
XSS via XML - Demo
XSS via location.href - Overview
XSS via location.href - Demo
XSS via vbscript: - Overview
XSS via vbscript: - Demo
From XSS to Remote Code Execution - Overview
From XSS to Remote Code Execution - Demo
Summary - XSS Attacks Part 2
Course #5: DOUBLE Your Web Hacking Rewards with Fuzzing
The Basics of Fuzzing
Fuzzing with Burp Suite Intruder - Overview
Fuzzing for SQL Injection - Demo
Fuzzing for Path Traversal - Demo
Fuzzing with Burp Suite Intruder: Tips and Tricks
Summary - Fuzzing
Course #6: How Web Hackers Make BIG MONEY: Remote Code Execution
From SQL Injection to Remote Code Execution - Overview
From SQL Injection to Remote Code Execution - Demo
From Disclosure of Software Version to Remote Code Execution - Overview
From Disclosure of Software Version to Remote Code Execution - Demo
Remote Code Execution via File Upload - Overview
Remote Code Execution via File Upload - Demo
Remote Code Execution via Deserialization - Overview
Remote Code Execution via Deserialization - Demo
Summary - Remote Code Execution