Free Udemy Course __ OSCP Ethical Hacking With Bug Bounty,Cloud,Defensive &Mobile

Ethical Hacking:- OSCP, Active Directory Mastery, Cloud Security, Mobile and Bug Bounty Expertise

4.5 (1,000+ students enrolled) English
specialized-tech Ethical Hacking
OSCP Ethical Hacking With Bug Bounty,Cloud,Defensive &Mobile

What You'll Learn

  • OSCP Prep Methodology
  • Bug Bounty Advance and Live Bug Bounty Sessions
  • Passive Information Gathering
  • Host And Nmap
  • SMB Enumeration
  • SMTP Enumeration
  • SNMP Enumeration
  • Web Application Assessment Tools
  • Web Attacks
  • Shells
  • Locating Public Exploits
  • Cracking SSH , RDP and WEB
  • Password Cracking
  • Windows Privilege Escalation
  • Situational Awareness
  • Hidden In Plain View
  • Goldmine AKA Powershell
  • Automated Enumeration
  • Leveraging Windows Services
  • DLL Hijacking
  • Scheduled Tasks
  • SeImpersonate Privilege
  • SeBackup Privilege
  • UAC Attack
  • Always Elevated
  • GPO Edit
  • Tools For Windows Privilege Escalation
  • Enumerating Linux
  • Automated Enumeration
  • Abusing Password Authentication
  • Abusing Binaries And Sudo
  • Exploiting Kernel Vulnerabilities
  • Exploiting Cron Jobs
  • Port Redirection And Tunneling
  • Ligolo NG
  • Chisel
  • SSH Tunneling
  • HTTP Tunneling
  • Active Directory Manual Enumeration
  • Active Directory Automatic Enumeration
  • LDAP Search
  • Active Directory Hacking
  • Cached AD Credentials
  • Password Attacks
  • AS-REP Roasting
  • Lateral Movement
  • Impacket Tools
  • Others Tools For Active Directory
  • File Transfer Linux-Linux
  • File Transfer Linux -Windows
  • Bug Bounty Automation
  • ReconFTW
  • NucleiFuzzer
  • Magic Recon
  • Subzy
  • SocialHunter
  • Authentication bypass via OAuth implicit flow
  • SSRF via OpenID dynamic client registration
  • Forced OAuth profile linking
  • OAuth account hijacking via redirect_uri
  • Stealing OAuth access tokens via an open redirect
  • Stealing OAuth access tokens via a proxy page
  • Remote code execution via web shell upload
  • Web shell upload via Content-Type restriction bypass
  • Web shell upload via path traversal
  • Web shell upload via extension blacklist bypass
  • Clickjacking And Its Bounty
  • Web shell upload via obfuscated file extension
  • Remote code execution via polyglot web shell upload
  • Web shell upload via race condition
  • TXT Records and Github Recon
  • Early Recon for a Web Application
  • Hacking Windows Server Using Eternal Blue
  • Ligolo-ng For Tunneling
  • Getting Hold Of Enum and Ways
  • Cached AD Credentials
  • Password Attacks For Active Directory
  • Lateral Movement For Active Directory
  • File Transfer Linux-Linux
  • File Transfer Windows-Linux
  • Meaning Of API
  • Security Mechanism Of API
  • IDOR and severity levels
  • No Rate Limit On Registration
  • No Rate Limit On Login
  • No Rate Limit On Contact Us Page
  • No Rate Limit On Redeem Page
  • No Rate Limit On Invite Link
  • Using Default Credentials
  • Infotainment, Radio Head Unit PII Leakage
  • RF Hub Key Fob Cloning
  • Misconfigured DNS High Impact Subdomain Takeover
  • OAuth Misconfiguration Account Takeover
  • Infotainment, Radio Head Unit OTA Firmware Manipulation
  • Misconfigured DNS Basic Subdomain Takeover
  • Mail Server Misconfiguration No Spoofing Protection on Email Domain
  • Misconfigured DNS Zone Transfer
  • Mail Server Misconfiguration Email Spoofing to Inbox due to Missing or Misconfigured DMARC on Email Domain
  • Database Management System (DBMS) Misconfiguration Excessively Privileged User / DBA
  • Lack of Password Confirmation Delete Account
  • No Rate Limiting on Form Email-Triggering
  • No Rate Limiting on Form SMS-Triggering
  • Exploiting Linux Machine With ShellShock
  • Exploiting Linux with dev shell and Privesc with cronjob
  • Basic password reset poisoning
  • Host header authentication bypass
  • Web cache poisoning via ambiguous requests
  • Broken Link HIjacking
  • HTTP By Default
  • HTTPS and HTTP Both Available
  • Improper Cache Control
  • Token Is Invalidated After Use On Registration
  • Token Is Invalidated After Use On Login
  • Token Is Invalidated After Use On Forgot Password
  • Token Is Invalidated After Use On Invite
  • Token Is Invalidated After Use On Coupon
  • Token Is Invalidated After Use On Collaboration
  • Introduction To Defensive Security
  • Overview of Cyber Security
  • Importance of Defensive Security
  • OSI Model
  • TCP/IP Basics
  • Subnetting
  • Interface And Cables
  • Security Fundamentals
  • Introduction to Mobile App Pentesting
  • Mobile App Pentesting Process
  • Practical:Reconnaissance on a target
  • Understanding the Android Architecture
  • Introducing android apps building blocks
  • Understanding Reverse Engineering
  • Performing lab setup on windows
  • Performing lab setup on kali linux
  • Performing lab setup on MAC
  • Setting up Emulator on Android studio
  • Setup for physical device
  • Pulling apk from playstore
  • Introduction to injured android
  • What to look at in AndroidManifest xml file
  • RCE In CSE-Webstore
  • HTML Email Injection
  • Token Leaked In Response
  • External Authentication Injection
  • Cleartext Transmission Of Session Token
  • Account Lockout Bypass
  • Token Leakage Via 3rd Party Referrer
  • CRLF To XSS
  • Clipboard Enabled
  • DoS To Owner
  • No Secure Integrity Check
  • Privacy Concern
  • Iframe Injection
  • Session Fixation
  • Wifi SSID + Password
  • Source Code Credential Storage
  • Cyber Security Quiz
  • Target Finding Methadology
  • Performing Static Analysis
  • Applying Static Analysis To Get Some Flags
  • Exploiting Storage Buckets
  • Exploiting Firebase Database
  • Understanding SSL Pinning
  • Using Burpsuite For Intercepting Traffic
  • Using Proxyman For Intercepting Traffic
  • Automation For Patching Applications
  • Manual Patching Of Applications
  • Understanding Broadcast Receiver
  • Decryption Using Frida
  • Understanding Sqlite databases In An Application
  • Performing Unicode Collision
  • Deeplinks And Binary Analysis
  • Using HTML To Generate Deep links(RCE)
  • Assembly Language And Shared Objects
  • DIVA Application
  • AndroGoat Application
  • Introduction To iOS
  • Automated Analysis Using MobSF
  • Introduction To Defensive Security
  • Overview of Cyber Security
  • Importance of Defensive Security
  • OSI Model
  • TCP/IP Basics
  • Subnetting
  • Lab Setup For Defensive
  • Interface And Cables
  • Security Fundamentals
  • Practical on Packet Tracer
  • Standard ACLs
  • Extended ACLs
  • Working Layer of Protocols
  • Wireshark And Nmap
  • Protocols and Ports
  • Compliance and Standards
  • Incident Response And Management
  • Risk Management
  • Firewall v/s IDP v/s IPS
  • SIEM
  • Windows and Linux Fundamentals
  • Countermeasure
  • Introduction To AWS Security
  • Monitoring & Logging in AWS
  • Overview About AWS CloudWatch & Guard Duty
  • Security Reference Architecture
  • AWS Config Theory
  • Log Analysis In Cloudwatch And Cloudtrail
  • Unauthorized Activity
  • Incident Response
  • Event Bridge
  • Overview About AWS Inspector & Defender
  • AWS Configuration Practicals Overview
  • CloudWatch Practical Overview
  • EventBridge Practical Overview
  • Amazon SNS Practical Overview
  • CloudTrail Practical Overview
  • AWS Shared Responsibility Model
  • Introduction To Owasp Top 10
  • A01 - Broken Access Control
  • A02 - Cryptographic Failures
  • A03 - Injections
  • A04 - Insecure Design
  • A05 - Security Misconfigurations
  • A06 - Vulnerable & Outdated Componenets
  • A07 - Identification & Authorization Failures
  • A08 - Software & Data Integrity Issues
  • A09 - Security Logging & Monitoring Failures
  • A10 - SSRF
  • Securing Layered Web Architecture In AWS
  • Best Practices To Secure Layered Web Application
  • Edge Security Design
  • DDOS Attack Overview & AWS Shield Introduction
  • Best Practices for DDOS Protection
  • Designing Secure Isolated Network Architecture
  • Gateways & Traffic Monitoring Concept In VPC
  • Difference In Security Group & NACL
  • AWS Firewall Tools Stack Overview
  • Common Use Cases of Edge Security Strategy
  • AWS Hybrid Network Security
  • Building AWS Hybrid Network Security Architecture
  • Reachability Analysis In AWS
  • Host Based Security In AWS
  • AWS Inspector Overview
  • Hardening Concept Overview
  • CV Making
  • Working Of IAM in AWS
  • Users in AWS IAM
  • Roles in AWS IAM
  • Policies in AWS IAM
  • Best Practices in AWS IAM
  • Introduction to Access Control Concept in AWS IAM
  • Overview about RBAC & ABAC access control
  • Separation of Duties Concept in AWS
  • Deployment of SOD in AWS
  • Active Directory in AWS
  • AWS Managed Active Directory
  • AD Connector in AWS
  • Scalable System Design to Access AWS Resources

Requirements

  • Basic Bug Bounty Knowledge
  • Basic Linux Knowledge
  • Learning Approach
  • High Sitting Hours
  • PC with minimum 8GB RAM
  • Scripting Knowledge

Who This Course is For

  • OSCP Prep
  • Cloud Security
  • Defensive Security
  • Mobile App Pentesting
  • Bug Bounty Advance
  • CEH
  • Active Directory
  • Linux Commands

Your Instructor

Armaan Sidana

Cyber Security Specialist

4.3 Instructor Rating

1,184 Reviews

36,860 Students

17 Courses

Get This Course For FREE

Get This Course

Limited time offer. Enroll now!

Never Miss a Coupon!

Subscribe to our newsletter to get daily updates on the latest free courses.