Start with the basics of bug Hunting and learn more about implementing an offensive approach by finding Vulnerabilities in web applications.
Moving on to the most challenging task for any web application, you will take a look at ho.
You will then discover how request forgery injection works on web pages and Applications in a mission-critical setup.
Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab.
Start with the basics of bug Hunting and learn more about implementing an offensive approach by finding Vulnerabilities in web applications