Summary of "Wiz Bug Bounty Masterclass | Complete Ethical Hacking Course (Free)"

Course overview

This course is a practical, hands-on guide to bug bounty hunting that focuses on terminal-first reconnaissance, deterministic tooling, and a full web-proxy workflow (Kaido). It covers tools, techniques, labs, and real-world tutorials to find high-impact bugs like IDOR, SSRF, blind XSS, subdomain takeover, secrets leakage, and actuator/heapdump exposures.

What the course teaches (big picture)

Reconnaissance — practical guide & tools

Goal: discover a company’s entire public attack surface (root domains, subdomains, acquisitions, certificate records).

Passive discovery:

Active discovery:

Filtering and probing:

Tips:

Web proxy + manual testing (Kaido-centered tutorial)

Why use an HTTP proxy:

Kaido features covered (setup and hands-on labs included):

Selected hands-on labs in Kaido:

AI in bug hunting

Key tools and categories (quick list)

Kaido plugins highlighted

Ethics and procedure

Real-world case studies (9 examples)

  1. DeepSeek (ClickHouse DB exposure)

    • Found via recon and port scan on an unusual port (9000). Unauthenticated ClickHouse exposed chat histories.
    • Mitigation: close public admin DB ports, require authentication, monitor certificates and hostnames.
  2. Airline API / Swagger exposure

    • Swagger/OpenAPI docs revealed member endpoints returning PII without authentication.
    • Lesson: always check API docs/open API specs for sensitive endpoints.
  3. “Shark” uploads directory (fuzzing → zip/sql dump)

    • FFUF discovered an uploads directory with a downloadable DB dump (SQL) containing PII — login page does not guarantee safety.
  4. Blind XSS in support tickets

    • Injected script into a support field; when an admin viewed the ticket the payload exfiltrated cookies/sessions. Classic blind XSS leading to admin compromise.
  5. Subdomain takeover

    • Unused host / misconfigured S3 bucket allowed claim of the bucket/host and serving content for the company subdomain. Detected via subfinder / httpx / nuclei.
  6. SSRF → AWS metadata / credential retrieval

    • SSRF allowed access to 169.254.169.254 (instance metadata), leading to credentials and deeper takeover. Large bounty awarded in a live event.
  7. GitHub token exposed in repo history

    • Public commit contained a token that granted access to enterprise repos and internal code. Lesson: scan commit history for secrets.
  8. Spring Boot actuator heap dump

    • Nuclei templates found /actuator/heapdump exposing in-memory secrets/auth tokens — common and critical.
  9. Zero-click account takeover via cookie/session switching

    • Session confusion between staging and production allowed a guest cookie from staging to be accepted in production — immediate account access with no user interaction.

How to get started — practical next steps

Hands-on labs, guides, and tutorial content referenced

Main speakers / authors / sources

Bottom line

This is a practical, hands-on course that blends terminal-first recon (subfinder / httpx / puredns / Naabu / Nuclei / FFUF) with a full web-proxy workflow using Kaido. It includes labs teaching common, high-impact bugs (IDOR, SSRF, blind XSS, subdomain takeover, secrets leakage, actuator/heapdump) and productivity plugins (Shift, Drop, Notes++, ParamFinder). The curriculum emphasizes collaboration, automation, and responsible disclosure.

Category ?

Technology


Share this summary


Is the summary off?

If you think the summary is inaccurate, you can reprocess it with the latest model.

Video