Get Mystery Box with random crypto!

Some Web Application Penetration Testing & Bug Bounty Notes | Ajgar cloud

Some Web Application Penetration Testing & Bug Bounty Notes

Phase 1 –
History

Phase 2 –
Web and Server Technology

Phase 3 –
Setting Up The Lab With BurpSuite And bWAPP

Phase 4 –
Mapping The Application And Attack Surface

Phase 5 –
Understanding And Exploiting OWASP Top 10 Vulnerabilities

Phase 6 –
Session Management Testing

Phase 7 –
Bypassing Client-Side Controls

Phase 8 –
Attacking Authentication/Login

Phase 9 –
Attacking Access Controls (IDOR, Priv Esc, Hidden Files And Directories)

Phase 10 –
Attacking Input Validations (All injections, XSS And Mics)

Phase 11 –
Generating And Testing Error Codes

Phase 12 –
Weak Cryptography Testing

Phase 13 –
Business Logic Vulnerability

Join @HackPsychs For More

Share And Support Us