Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status to see all hidden content (how to buy - Premium status)

    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

Intro to Bug Bounty Hunting and Web Application Hacking

  • Thread starter User_30344
  • Start date
  • Replies 15
  • Views 20K

U

User_30344

Guest
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


 

bbc44

New user
Landboar
Joined
Jun 10, 2024
Messages
9
Reaction score
0
NL COIN
20
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
Looking forward to content like this.
 

raheem

Under Review
Under Review
Joined
Jan 15, 2025
Messages
3
Reaction score
0
NL COIN
4
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
nice
 

raheem

Under Review
Under Review
Joined
Jan 15, 2025
Messages
3
Reaction score
0
NL COIN
4
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
 

raheem

Under Review
Under Review
Joined
Jan 15, 2025
Messages
3
Reaction score
0
NL COIN
4
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
coool great loves thats
 

kozzza

New user
Landboar
Joined
Jan 16, 2025
Messages
5
Reaction score
0
NL COIN
13
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Скрытый текст не может быть процитирован. ***
cool
 

ramizjaber155

Under Review
Under Review
Joined
Mar 26, 2025
Messages
3
Reaction score
0
NL COIN
4
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
thanks for the course
 

ramizjaber155

Under Review
Under Review
Joined
Mar 26, 2025
Messages
3
Reaction score
0
NL COIN
4
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
thanks a lot for the course
 

ramizjaber155

Under Review
Under Review
Joined
Mar 26, 2025
Messages
3
Reaction score
0
NL COIN
4
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
i've replied to this post a lot of times and its not showing the link why??
 

larrva

Under Review
Under Review
Joined
Aug 13, 2025
Messages
2
Reaction score
0
NL COIN
3
What you’ll learn
Learn 10+ different vulnerability types

Ability to exploit basic web application vulnerabilities

Basics of Reconnaissance (recon)

How to approach a target

Understand how bug bounties work

Write better bug bounty reports

Includes practical hands on labs to practice your skills

Hack Websites for Ethical Hacking

Cross-Site Scripting (XSS)

SQL Injection

Server-Side Request Forgery (SSRF)

Requirements
Basic understanding of web technology

Linux basics

Reliable internet connection.

Who this course is for:
Beginners in cybersecurity

People interested in bug bounty hunting

Anyone interested in ethical hacking

Developers looking to expand on their knowledge of vulnerabilities that may impact them

Anyone interested in application security

Anyone interested in Red teaming

Anyone interested in offensive security

Bug Bounty Hunters

Hack Websites for Ethical Hacking


*** Hidden text: cannot be quoted. ***
good bro
 

ArtiMode

Under Review
Under Review
Joined
Aug 21, 2025
Messages
2
Reaction score
0
NL COIN
3
Чему вы научитесь
Изучите более 10 различных типов уязвимостей

Возможность эксплуатации основных уязвимостей веб-приложений

Основы разведки (разведка)

Как приблизиться к цели

Понять, как работают программы вознаграждения за обнаружение ошибок

Пишите более качественные отчеты о вознаграждении за обнаруженные ошибки

Включает практические лабораторные работы для отработки навыков

Взломайте сайты для этичного хакинга

Межсайтовый скриптинг (XSS)

SQL-инъекция

Подделка запросов на стороне сервера (SSRF)

Требования
Базовое понимание веб-технологий

Основы Linux

Надежное интернет-соединение.

Для кого этот курс:
Новички в кибербезопасности

Люди, интересующиеся охотой за насекомыми

Любой, кто интересуется этичным хакингом

Разработчики, желающие расширить свои знания об уязвимостях, которые могут на них повлиять

Любой, кто интересуется безопасностью приложений

Любой, кто заинтересован в объединении Красной команды

Любой, кто интересуется наступательной безопасностью

Охотники за насекомыми

Взломайте сайты для этичного хакинга


*** Скрытый текст: не может быть цитирован. ***
[/ЦИТИРОВАТЬ]
Очень даже не плохо
 
shape1
shape2
shape3
shape4
shape7
shape8
Top