Burp Web Security Academy - Practitioner Labs Walkthrough | Bestseller Penetration Testing course
Master professional in Web Application Penetration Testing and preparing for the Burp Suite Certified Practitioner (BSCP)
Burp Web Security Academy - Practitioner Labs Walkthrough | Bestseller Penetration Testing course |
Description
This course features all current 145+ Practitioner labs. Martin is solving them all and giving useful insight on how to find and exploit these vulnerabilities. He is not just inserting the payload but explains each step on finding the vulnerability and why it can be exploited in a certain way. The videos are easy to follow along and replicate. Martin is also dropping a lot of tips and tricks for those who wish to get the Burp Suite Certified Practitioner certification (BSCP). This training is highly recommended for anyone who wants to become a professional in Web Application Penetration Testing, Web Application Bug Bounty Hunting or take the Burp Suite Certified Practitioner certification (BSCP) certification.
It will feature all apprentice labs in the following sections:
· SQL injection
· Cross-site scripting
· Cross-site request forgery (CSRF)
· Clickjacking
· DOM-based vulnerabilities
· Cross-origin resource sharing (CORS)
· XML external entity (XXE) injection
· Server-side request forgery (SSRF)
· HTTP request smuggling
· OS command injection
· Server-side template injection
· Directory traversal
· Access control vulnerabilities
· Authentication
· WebSockets
· Web cache poisoning
· Insecure deserialization
· Information disclosure
· Business logic vulnerabilities
· HTTP Host header attacks
· OAuth authentication
· File upload vulnerabilities
· JWT
· Essential skills
· Prototype pollution
Notes & Disclaimer
Portswigger labs are public and a free service from Portswigger for anyone to use to sharpen their skills. All you need is to sign up for a free account. I will update this course with new labs as they are published. I will respond to questions in a reasonable time frame. Learning Web Application Pen Testing / Bug Bounty Hunting is a lengthy process, so please don’t feel frustrated if you don’t find a bug immediately. Try to use Google, read Hacker One reports, and research each feature in-depth. This course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.