Book Content
chapters • 9h total length
1. Basics of Bug Bounty Hunting
2. How to write a Bug Bounty Report
3. SQL Injection Vulnerabilities
4. Cross Site Request Forgery
5. Application Logic Vulnerabilities
6. Cross Site Scripting Attacks
7. SQL Injection
8. Open Redirect Vulnerabilities
9. Sub Domain Takeover
10. XML External Entity Vulnerability
11. Template Injection
12. Top Bug Bounty Hunting tools
13. Top Learning resources














