WANNA LEARN BUG-BOUNTY

START WITH BASIC CONCEPTS

One of the best earning source in the world is Bug-Bounty. Some of them do not know what is bug bounty. Well no worries read the defintion next to this sentence. BUG BOUNTY IS PROCESS OF FINDING AND REPORTING PROBLEMS IN ANY SOFTWARE SO THAT THE COMPANY OWNS THAT PARTICULAR SOFTWARE WILL PROVIDE REWARD FOR SAVING THEM. Read the below three question and get a clear vision about bug bounty. So what are you waiting for swipe down and start learning.

WHAT YOU GET FROM US??

FREELANCE

ONLINE COMPILER

FREE E-BOOKS

FREE SOFTWARE

LEARNING TUTORIAL

CALL SUPPORT

THREE COMMON QUESTIONS

BUG & VULNERABILITY

Many people got stuck with this question. With out making your basics strong it is not good to learn bug bounty. So let’s see what is bug and vulnerability. Basically bug can be differentiated into many types. All of them collectively known as bug. It can be both harmless and harmful. For example in a website if a option not worked that’s a harmless bug and the security problems are harmful bug. Vulnerability is something that only denotes to harming the software.

WHAT IS EXPLOITING

If you have not read the first answer yet read it for better clearance about bug and vulnerability. Simple definition for exploitation is using vulnerability making some harm to the particular software or website or web application.

CAN I EARN LOT VIA BUG BOUNTY??

The answer is yes only if you have the passion on it. By seeing the money don’t get into this field. Create a interest over it. Thinking of money will hide your eyes from seeing the success. Follow your passion. When you gets in right tract money will started following you

WISHING YOU A HAPPY LEARNING FROM DROP 🙂

Burp Suite Installation & Configuration In Windows & Firefox Installing Certificate

In Firefox, open the burger menu and click “Preferences” or “Options”. From the navigation bar on the left of the screen, open the “Privacy and Security” settings. Scroll down to the “Certificates” section and click the “View certificates” button. In the dialog that opens, go the “Authorities” tab and click “Import”.

BurpSuite Setup Tutorial Penetration Testing

The sections below describe the essentials of how to use Burp Suite within your web application testing workflow. For help with installing and launching Burp, starting projects, and configuring display settings,

Brute Force Attack In Website

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing a combination correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

BurpSuite SiteMap Tutorial

The site map aggregates all of the information that Burp has gathered about applications. You can filter and annotate this information to help manage it, and also use the site map to drive your testing workflow.

{CSRF} Cross Site Request Forgery Explained How it's Work Live Testing Hindi Tutorial

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorized commands are submitted from a user that the web application trusts.

Discover Web Vulnerabilities with Uniscan

Uniscan is a simple web vulnerability scanner that searches for common flaws like local file include, remote command execution, and remote file include vulnerabilities. It’s also able to fingerprint and enumerate web services, interesting files and directories, and server information.

CEH Class | Bug Bounty | SSRF, CSRF, IDOR, XSS, FPD, Command Injection | Attack Review

A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. … Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability.

Full Path Disclosure Vulnerability - A Dangerous Bug For A Website

Description. Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. … Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view.

WordPress Vulnerability Scanning With WPScan

WPScan is an open source WordPress security scanner. You can use it to scan your WordPress website for known vulnerabilities within the WordPress core, as well as popular WordPress plugins and themes. … It has an ever-growing list of WordPress core, plugins and themes vulnerabilities.

Sparta Vulnerability Scanner Penetration Testing Kali Linux Tools

SPARTA is a python GUI application that simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to their toolkit and by displaying all tool output in a convenient way. If less time is spent setting up commands and tools, more time can be spent focusing on analysing results.

What is Payload and Exploit | What is Vulnerability | Difference between Payload and Exploit

Exploit – An exploit is the means by which an attacker, or penetration tester for that matter, takes advantage of a vulnerability within a system, an application, or a service. … Payload – A payload is a custom code that attacker want the system to execute and that is to be selected and delivered by the Framework.

MD5 Hash Decrypt and Encrypt

The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. Although MD5 was initially designed to be used as a cryptographic hash function, it has been found to suffer from extensive vulnerabilities.

Encryption and Decryption Explained

Encryption is a process which transforms the original information into an unrecognizable form. Decryption is a process of converting encoded/encrypted data in a form that is readable and understood by a human or a computer. Encryption method helps you to protect your confidential data such as passwords and login id.

Protocol Networking in Hindi | Types of Protocol

In networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a common language for computers. The computers within a network may use vastly different software and hardware; however, the use of protocols enables them to communicate with each other regardless.

Vulnerabilities, Zero Day, Daisy Chaining, Doxing, Botnet

A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application. Stakeholders include the application owner, application users, and other entities that rely on the application.

Password Attack | Brute-force | Find Username & Password

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing a combination correctly. The attacker systematically checks all possible passwords and passphrases until the correct one is found.

Most Advanced Vulnerability Scanner Tool Vega

Vega is a free and open source web security scanner and web security testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.

XSS Attack Tutorial | Cross Site Scripting

Cross-site scripting is a type of security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.

WANNA EXPLORE MORE

OUR COURSES

This is course which includes contents to become a ethical hacker with practicals. We will provide hardcopy certification. Classes are conducted through meet. You will get life time call support. For more information visit our site by clicking the button below.

This is course includes all about python programming language scratch to master . We will provide hardcopy certification. Classes are conducted through meet. You will get life time call support. For more information visit our site by clicking the button below.

If you are new to IT domain then this is right course to start with. We will provide softcopy certification. Classes are conducted through meet. You will get life time call support. For more information visit our site by clicking the button below.

Contact

Media Presence

Stay tuned with us

© Copyright 2020 powered by Drop