-
Day 5 | Information Gathering
Web Reconnaissance is the foundation of a thorough security assessment.
-
Day 4 | Intro to Web Proxies Pt. 2
Burp Suite and OWASP ZAP
-
Day 3 | Intro to Web Proxies
Burp Suite and OWASP ZAP
-
Day 2 | Web Applications!
Web application components, vulnerabilities, and common security risks
-
Day 1 | Starting the Bug Bounty Journey
Essential Linux commands for navigation, system information, user management, and permissions