Torrent Info
Title Bug ([UdemyCourseDownloader] Bug Bounty Hunting - Offensive Approach to Hunt Bugs)
Category Movies
Size 7.39GB

Movie Info
Bug
Title Bug
Year 2015
Country USA
Category Drama, Mystery, Thriller
Director Parker Dorris
Actors Glenn Morshower, Gene Jones, Heather Kafka, Shane Jacobsen
Description Bug is a 12 year old girl who finds out that her grandpa, the town's retired sheriff, may have committed and covered up a racially motivated murder years ago. Now Bug is out to right an old wrong.
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 About Instructor.mp4 198.92MB
002 Course Introduction and Overview.mp4 67.03MB
003 Why you should take this.mp4 26.76MB
004 Teaser of Offensive Approach to Hunt Bugs.mp4 1.04GB
005 Information Gathering.mp4 150.13MB
006 Steps to Configure Burpsuite with Firefox.mp4 60.11MB
007 How to Use Burpsuite - Spider Repeater Intruder.mp4 57.27MB
008 Background Concept about XSS.mp4 42.08MB
008 Background-Concept-XSS.m4v 10.51MB
008 Background-XSS.pdf 25.80KB
009 Basic XSS.mp4 155.30MB
009 Basic-xss.pdf 18.69KB
010 Basic XSS on Lab.mp4 199.60MB
010 BASIC-XSS-ON-LAB.txt 1.13KB
011 Manual Building XSS Vector.mp4 145.96MB
011 Manual-xss.txt 791B
012 xss.txt 11.67KB
012 XSS through Filter Bypassed XSS payloads On Lab.mp4 117.68MB
013 XSS On Live Websites.mp4 233.96MB
014 XSS Hunting Live Part 1.mp4 93.41MB
015 XSS Hunting Live Part 2.mp4 168.52MB
016 XSS Hunting Live Part 3.mp4 86.97MB
017 XSS Through Header Parameter.mp4 62.53MB
018 Reflected XSS Vs Stored XSS.mp4 51.82MB
019 Exploitation of XSS - 1. URL Redirection.mp4 17.83MB
020 Exploitation of XSS - 2. Phishing Through XSS.mp4 35.03MB
021 Exploitation of XSS - 3. Cookie Stealing.mp4 86.98MB
022 XSS Through File Uploading.mp4 45.39MB
023 XSS Through Remote File Inclusion.mp4 17.63MB
024 Convert Self XSS to Reflected XSS.mp4 39.91MB
025 POC - 1 XSS Attack Discovered by Shubham Maheshwari.mp4 18.94MB
026 POC - 2 XSS Attack Discovered by Shubham Maheshwari.mp4 10.86MB
027 POC - 3 XSS Attack Discovered by Shubham Maheshwari.mp4 10.93MB
028 POC 4 XSS Attack Discovered by Ankit Singh.mp4 14.39MB
029 POC 5 XSS Attack Discovered by Ankit Singh.mp4 24.95MB
030 POC 6 XSS Attack Discovered by Ankit Singh.mp4 35.41MB
031 POC 7 XSS Attack Discovered by Ankit Singh.mp4 12.55MB
032 POC 8 XSS Attack Discovered by Ankit Singh.mp4 20.87MB
033 HHA.txt 1.17KB
033 Overview of Host Header Injection.mp4 16.56MB
034 Host Header Attack 1. Open Redirection.mp4 72.96MB
035 Host Header Attack 2. Cache Poisoning.mp4 19.77MB
036 Host Header Attack 3. Password Reset Poisoning.mp4 34.52MB
037 Host Header Attack 4. XSS Through Host Header.mp4 30.52MB
038 POC - 1 Host Header attack by Shubham Maheshwari.mp4 8.18MB
039 POC - 2 Host Header Attack Discovered by Shubham Maheshwari.mp4 8.88MB
040 POC - 3 Host Header Attack Discovered by Shubham Maheshwari.mp4 9.77MB
041 POC -4 Host Header Attack Discovered by Shubham Maheshwari.mp4 10.78MB
042 POC - 5 Host Header Attack Discovered by Shubham Maheshwari.mp4 11.39MB
043 POC - 6 Host Header Attack Discovered by Shubham Maheshwari.mp4 14.01MB
044 POC - 7 Host Header Attack Discovered by Shubham Maheshwari.mp4 9.29MB
045 Background Concept about URL Redirection.mp4 1.96MB
045 URL-Redirection-Background.pdf 31.99KB
046 URL Redirection Through Get Parameter.mp4 21.85MB
046 URL-Redirection-Through-Get-Parameter.pdf 30.14KB
047 URL Redirection Through Path Fragments.mp4 17.39MB
048 POC of URL Redirection 1.mp4 335.79KB
048 Screen-Shot-E8-03-22-at-09.56.19.png 50.69KB
049 POC of URL Redirection 2.html 1.26KB
050 POC 3 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4 5.65MB
051 POC 4 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4 6.67MB
052 POC 5 Open Redirection Vulnerability Discovered by Shubham Maheshwari.mp4 9.99MB
053 POC 6 Open Redirection Vulnerability Discovered by Dawood Ansar.mp4 17.03MB
054 Background Concept about Parameter Tampering.mp4 4.84MB
054 Background-Parameter-Tampering.pdf 25.29KB
055 Parameter Tampering - Example 1.mp4 7.31MB
056 Parameter Tampering - Example 2.mp4 7.88MB
057 Parameter Tampering - Example 3.mp4 6.82MB
058 Parameter Tampering - Example 4.mp4 13.89MB
059 Parameter Tampering - Example 5.mp4 12.31MB
060 Background Concept about HTML Injection.mp4 2.16MB
060 Background-HTMLI.m4v 2.14MB
061 HTML Injection Finding - Example1.mp4 6.67MB
062 HTML Injection Finding - Example2.mp4 13.65MB
063 HTML Injection Finding - Example3.mp4 12.44MB
064 Exploitation of HTML Injection.html 2.42KB
065 Background Concept about File Inclusion.mp4 17.89MB
065 File-incusion.txt 1.11KB
066 LFI Vs RFI.mp4 41.26MB
067 LFI Hunting Part 1.mp4 28.91MB
068 LFI Hunting Part 2.mp4 48.37MB
068 pathtotest-huge.txt 488.35KB
069 Exploitation of LFI.mp4 31.34MB
070 RFI Hunting.mp4 50.90MB
071 Background Concept about Missing insufficient SPF record.mp4 3.45MB
071 Background-SPF.pdf 23.05KB
072 Testing SPF.mp4 6.90MB
072 Testing-SPF.pdf 19.67KB
073 Exploitation of SPF.mp4 11.42MB
074 POC 1 SPF.mp4 15.17MB
075 POC 2 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 14.33MB
076 POC 3 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 15.48MB
077 POC 4 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 18.37MB
078 POC 5 - SPF Vulnerability Discovered by Shubham Maheshwari.mp4 12.39MB
079 Background Concept about CORS.mp4 4.37MB
079 Background-Concept-Insecure-CORS.pdf 23.93KB
080 Insecure CORS by Checking Response Header.mp4 13.08MB
080 Insecure-CORS-Response-Header.pdf 22.90KB
081 Insecure CORS through Request Header.mp4 17.10MB
081 Insecure-CORS-Through-Request-Header.pdf 40.31KB
082 exploitation-cors.pdf 26.51KB
082 Exploitation of Insecure CORS.mp4 28.16MB
083 POC Insecure CORS.html 1.02KB
084 Background Concept about SSRF.mp4 13.69MB
085 SSRF Testing on Lab.mp4 110.84MB
086 SSRF.pdf 35.96KB
086 SSRF on Live web.mp4 52.12MB
087 Exploitation of SSRF attack.mp4 102.59MB
087 SSRF.pdf 35.96KB
088 Background Concept about Critical File Found.mp4 17.63MB
089 Critical File Found on Live web 1.mp4 72.38MB
089 dicc.txt 82.14KB
090 Critical-File.pdf 23.07KB
090 Critical File Found on Live web 2.mp4 137.58MB
091 Background Concept about Source Code Disclosure.mp4 12.28MB
092 Source Code Disclosure on Lab.mp4 42.57MB
093 dicc.txt 82.14KB
093 Source Code Disclosure on Live Web.mp4 23.14MB
094 Background Concept about CSRF.mp4 25.41MB
095 Injection Point for CSRF.mp4 12.64MB
096 CSRF on Logout Page.mp4 21.08MB
097 CSRF Live.mp4 33.03MB
098 CSRF page on some critical Business Logic Page.mp4 50.71MB
099 CSRF POC -1 Discovered by Ankit Singh.mp4 22.65MB
100 CSRF POC 2 Discovered by Ankit Singh.mp4 26.32MB
101 CSRF POC -3 Discovered by Ankit Singh.mp4 20.60MB
102 Background Concept about Hostile Subdomain Takeover.mp4 51.88MB
103 Hostile.txt 953B
103 Hostile Subdomain Takeover on Live web 1.mp4 93.94MB
104 Hostile Subdomain Takeover on Live web 2.mp4 82.22MB
105 Background Concept about SQL injection.mp4 27.49MB
106 SQL Injection Lab Setup.mp4 73.90MB
107 Injection Point for SQL Injection.mp4 43.58MB
108 Learn SQL Query Fixing.mp4 103.34MB
108 SQLI.pdf 38.41KB
109 SQLI GET Based Part 1.mp4 117.91MB
110 SQLI GET Based Part 2.mp4 63.64MB
111 SQLI GET Based Part 3.mp4 107.64MB
112 Exploitation of GET Based SQLI.mp4 236.99MB
112 sqli.txt 3.97KB
113 SQLI POST Based Part 1.mp4 107.30MB
114 SQLI POST Based Part 2.mp4 113.97MB
115 Exploitation of POST Based SQLI.mp4 146.13MB
115 sqli.txt 10.53KB
116 SQLI Header Based.mp4 45.98MB
117 Exploitation of Header Based SQLI.mp4 23.19MB
118 SQLI Cookie Based.mp4 37.56MB
119 Exploitation of Cookie Based SQLI.mp4 30.07MB
120 WAF Bypassing for SQLI.mp4 90.14MB
121 Authentication Bypassing through SQLI.mp4 57.87MB
122 Automation of SQLI GET Based.mp4 175.65MB
122 SQLI.pdf 38.41KB
123 Automation of SQLI Post Based Header Based and Cookie Based.mp4 118.05MB
124 Automation of SQLI Part 3 With WAF Bypassing.mp4 96.77MB
125 SQLI.pdf 38.41KB
125 SQLI on Live Web 1.mp4 48.19MB
126 SQLI Live Bug Bounty Website.mp4 174.36MB
127 SQL Injection Live Website.mp4 43.28MB
128 Background-CMDi.pdf 26.89KB
128 Background Concept about Command Injection.mp4 4.94MB
129 Command Injection on Lab Part 1.mp4 9.67MB
130 Command Injection on Live Web 1.mp4 11.32MB
131 cmd.txt 4.87KB
131 Command Injection on Live Web 2.mp4 6.14MB
131 Delimeter-List.txt 72B
132 exploitation-CMDI.pdf 30.84KB
132 Exploitation of Command Injection.mp4 8.09MB
133 Background Concept about File Uploading.mp4 10.03MB
133 File-Uploading.pdf 25.00KB
134 File Uploading Part 1.mp4 73.42MB
135 File Uploading Part 2.mp4 46.15MB
136 File Uploading Part3.mp4 54.40MB
137 File Uploading on Live Part 2.mp4 13.51MB
138 Background Concept about XXE Injection.mp4 13.85MB
138 XXE.pdf 22.63KB
139 xml-attacks.txt 12.16KB
139 XXE on Lab.mp4 25.81MB
140 Thank you message from Vikash Chaudhary.mp4 2.02MB
udemycoursedownloader.com.url 132B
Udemy Course downloader.txt 94B
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent