Library

Course: Keep Hacking and Making Money at HackerOne

Keep Hacking and Making Money at HackerOne

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
  • Self-Paced
About this Course

This course is the follow-up to one of my previous courses – "Start Hacking and Making Money Today at HackerOne". We will continue our bug hunting journey and you will learn about the next 5 bugs that have been successful for me for years!

HackerOne is a big opportunity for you. At HackerOne you can legally hack some of the biggest companies (Twitter, Uber, Yahoo, Coinbase, Slack, etc.), and you can get paid for your findings. You can earn for example $100, $1,000 or $10,000 per one bug. It’s just amazing. All you need are Internet connection and knowledge. 

Yes, you need knowledge and this is exactly what I’m going to give you in this course. I’m one of the top hackers at HackerOne (among more than 100,000 registered hackers), and I really know how to make money out there. If you want to keep hacking and making money at HackerOne, then this course is just for you. 

You will learn about the next 5 bugs that I recommend you to play with (these bugs have been successful for me for years). Here are these bugs: 

  • How to Impersonate a User via Insecure Log In
  • Sensitive Information in Metadata
  • Disclosure of Credentials
  • Insecure Password Change
  • Dictionary Attack 

For every single bug there is a DEMO so that you can see how to find these bugs step-by-step in practice. 

Do you want to make money in bug bounty programs? Let’s enroll to this course and continue our exciting journey.

Basic knowledge
  • Basic hacking skills
What you will learn
  • Explore the next 5 bugs that really work
  • Discover how to find these bugs step-by-step in practice (DEMOS)
  • Get paid for your findings
  • Become a successful bug hunter 
  • Learn from one of the top hackers at HackerOne
Curriculum
Number of Lectures: 12
Total Duration: 00:54:50
Introduction
  • Introduction  
How to Impersonate a User via Insecure Log In
  • How to Impersonate a User via Insecure Log In - Overview  
  • How to Impersonate a User via Insecure Log In - Demo  
Sensitive Information in Metadata
  • Sensitive Information in Metadata - Overview  
  • Sensitive Information in Metadata - Demo  
Disclosure of Credentials
  • Disclosure of Credentials - Overview  
  • Disclosure of Credentials - Demo  
Insecure Password Change
  • Insecure Password Change - Overview  
  • Insecure Password Change - Demo  
Dictionary Attack
  • Dictionary Attack - Overview  
  • Dictionary Attack - Demo  
Summary
  • Summary  
Reviews (0)