Home
:
Book details
:
Book description
Description of
Race Conditions In The Real World Application For Bug Bounty
Published 2/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 2.90 GB | Duration: 2h 40m Learn to Find , Exploit different types of race conditions in real world applications (predicting,probing,proving) What you'll learn Introduction to race conditions and its types Exploiting different types of race conditions Hands on lab practice with techniques and strategies Real world examples and case studies Race conditions impact such as privilege escalation , account takeover , serious business logic vulnerbilities Beginners friendly Requirements It is beginner friendly any one who is willing to learn race condition for real world applications can pursue it Basic understanding of OWASP top 10 will be great Background related to bug bounty will be good otherwise no issue Basic understanding with tools like Burpsuite Basic understanding with language like python (if you want to make custom turbo intruder payload) otherwise it will work without it not an issue. Basic understanding with vulnerabilites like IDOR,account takeover Some knowledge of analyzing api docs,api endpoints Description Overview Section 1: Introduction Lecture 1 Author Introduction Lecture 2 Course Introduction Lecture 3 Getting Started Lecture 4 Understanding with example Section 2: Types of race condition Lecture 5 Technical terms and types of race conditions Lecture 6 Limit overrun race condition part1 Lecture 7 Limit overrun race condition part2 Lecture 8 Multi-endpoint race condition Lecture 9 Single-endpoint race condition Lecture 10 Time sensitive race condition Section 3: Understanding some real world examples with real proof of concepts Lecture 11 Claiming single use coupon code multiple times Lecture 12 Finding business logic vulnerabilities Section 4: Account takeover methodology (real world example case-study)-Extra Lecture 14 How can we perform account takeover using race condition Ethical hackers,Bug hunters,Developers,Security engineers,Api testers,IT enginners,Anyone who want to learn race conditions for applications,Security analysts