Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to ad... more
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 128 episodes available.
November 12, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 8: Exploiting Hidden Administrative Pages and Directory ListingIn this lesson, you’ll learn about:Security Misconfiguration — overview: a broad class of vulnerabilities caused by insecure defaults, incorrect application logic, or poorly documented configuration choices.Why it matters: misconfigurations often expose sensitive functionality or data and are frequently exploitable with low effort, making them high-impact risks.Secret administrative pages (hidden-by-obscurity):Developers sometimes “hide” admin pages by using obscure filenames (e.g., admin.php) instead of enforcing access controls.Attack technique: brute force or dictionary-based guessing of common admin filenames/paths (using tools like Burp Intruder).Demonstration outcome: discovered hidden admin page and exposed configuration UI—shows that obscurity ≠security.Directory listing vulnerabilities:Definition: web server exposes a directory’s file list when no index file exists.Impact: attackers can enumerate files (configs, backups, scripts) and retrieve sensitive data without complex exploits.Demonstration outcome: discovered exposed files (e.g., config.inc) revealing DB credentials and other secrets.Testing approaches demonstrated: use automated requests (Intruder), spidering, and targeted parameter fuzzing to discover hidden pages and directory listings.Detection signals: presence of index-missing directory pages, unexpected file names in listings, or responses revealing configuration details.Mitigations & best practices:Disable directory listing on web servers and ensure default index files are in place.Enforce proper authentication and authorization on admin/management pages (don’t rely on obscurity).Remove or secure development/debug pages and sensitive files before deployment.Implement least-privilege file permissions and avoid storing secrets in web-root files.Regularly scan for exposed endpoints (automated discovery + manual review) and include config checks in CI/CD pipelines.Practical recommendation: treat every endpoint as potentially discoverable—harden server defaults, perform regular configuration audits, and document config changes to prevent accidental exposures.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more12minPlay
November 12, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 7: Insecure Direct Object Reference (IDOR): Understanding, TestingIn this lesson, you’ll learn about:IDOR (Insecure Direct Object Reference) — definition: when user-supplied references (IDs) let attackers access or modify objects they’re not authorized to (files, records, accounts).Core mechanism: the app trusts the client-supplied identifier instead of enforcing authorization checks on the server side.Simple IDOR testing (numeric IDs): try adjacent or sequential IDs (e.g., /user=123 → /user=124) and watch for different responses.Automation of basic tests: use tools like Burp Intruder with a numeric payload (start/stop/step) and monitor response lengths/status for differences.Detection signals: changing content length, differing response bodies, or absence/presence of access-denied messages indicate possible IDOR.Advanced IDOR — obscured IDs (UUIDs): UUIDs are hard to guess; testing requires finding where the UUID leaks (page source, API responses, invitation flows, team endpoints).Techniques to find UUID leaks: inspect page source, JSON responses, invitation links, or any client-side data that may expose identifiers.Impact & reporting: even non-guessable IDs are valid findings if sensitive data can be accessed; explain impact clearly to evaluators.Practical demo — file access IDOR: intercept a request (e.g., source_viewer.php?file=user_file.php), modify the file parameter to an unauthorized target (e.g., index.php) and observe source disclosure.Mitigations: enforce server-side authorization checks for every object access, use indirect references or per-user mapping, avoid predictable IDs in URLs, and implement least privilege for object access.Analogy (teaching aid): like a hotel key coded with a room number — if you can change the number on your key and open other rooms, the system is IDOR-vulnerable.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
November 12, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 6: Broken Authentication and Session Management: Exploits and DefensesIn this lesson, you’ll learn about:Broken Authentication and Session Management (BASM):A critical OWASP Top 10 vulnerability that arises from poor handling of user authentication and session controls.Common causes include developer negligence and insecure practices that allow attackers to hijack or reuse valid sessions.Key causes and developer mistakes:Exposing session IDs in the URL.Failing to implement proper session timeouts.Reusing the same session ID before and after login.Storing or transmitting session cookies insecurely, making them vulnerable to theft (e.g., via XSS).Common exploitation methods:Brute Force Attacks:Attackers use automated tools (like Burp Suite Intruder in cluster bomb mode) to guess valid username-password pairs.Exploits weak password policies or lack of rate-limiting.SQL Injection Login Bypass:Attackers inject malicious SQL payloads (e.g., 1=1, ' OR '1'='1) into login fields.The server interprets the input as a valid condition, granting unauthorized access without valid credentials.Prevention and mitigation strategies:Implement Multi-Factor Authentication (MFA): Adds an extra verification layer against stolen or brute-forced credentials.Enforce strong password policies: Disallow weak or default credentials; check against known password breach lists.Prevent account enumeration: Use identical messages for login, registration, and recovery outcomes.Limit failed login attempts: Apply lockouts, rate limits, and alert administrators of repeated failures.Use secure session management:Generate new random session IDs after login (high entropy).Avoid placing session IDs in URLs.Invalidate sessions on logout or inactivity.Store session data securely on the server side.Core takeaway:Understanding BASM helps identify how insecure session handling and weak authentication mechanisms can compromise entire systems. Applying layered defenses ensures both authentication robustness and session integrity.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
November 12, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 5: Utilizing Burp Suite Decoder, Comparer, Sequencer, and Engagement ToolIn this lesson, you’ll learn about:Burp Decoder — purpose & features: decode/encode request and response content (URL, HTML, Base64, ASCIIhex, etc.); smart-decode that detects likely encodings automatically; useful for deobfuscating payloads and analyzing encoded data.Burp Comparer — purpose & uses: visually diff two pieces of content (requests/responses) to highlight added, removed, or changed text; great for spotting subtle response differences during username enumeration, analyzing Intruder outputs, or comparing blind-SQLi responses.Burp Sequencer — purpose & methodology: collect samples of tokens (session IDs, CSRF nonces) via live capture or manual input; run statistical/randomness tests (including FIPS-like tests) to evaluate entropy and predictability of serial values.Supplemental engagement tools — overview & workflows:Search: find strings or regexes across requests/responses to locate indicators or sensitive data.Analyze target: map dynamic vs. static content and enumerate parameters to organize testing.Discover content: brute-force files/directories using wordlists and extensions to reveal hidden endpoints.Find commands/scripts/references: locate inline commands, client/server scripts, comments, and external references that may leak sensitive info.Schedule task / Simulate manual testing: administrative helpers (note: “Simulate manual testing” is largely cosmetic according to the source).Practical guidance: combine these utilities with Proxy/Repeater/Intruder workflows—use Decoder to prepare payloads, Comparer to validate behavioral differences, Sequencer to verify token strength, and Discover/Analyze tools to expand your attack surface.Security & process note: gather samples and perform destructive tests only within authorized scope; document findings and test methods for reproducible PoCs.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more14minPlay
November 12, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 4: Burp Suite Proxy: Configuration, Request Interception, and RepeaterIn this lesson, you’ll learn about:Burp Proxy tab — purpose & subtabs: Intercept (toggle request interception), HTTP History (record of proxied requests), and Options (listen address/port configuration).How the proxy works: Burp listens for browser traffic on a configured IP and port (default 127.0.0.1:8080); the browser must be configured for manual proxying to point to the same host/port.Intercept workflow: with Intercept on you can view request details (headers, cookies, params, user-agent), then Forward the request to the server or Drop it to stop it.Configuring the listening interface: use Proxy → Options to change the bind address/port or add additional listener entries (useful for VM / remote testing).Recommended browser: use a separate testing browser (Mozilla Firefox recommended) to avoid contaminating your daily browser profile.Handling HTTPS traffic: Burp generates per-host SSL certs signed by its own CA — install Burp’s CA certificate into the browser (visit http://burp while proxied to download it), then mark it trusted (“Trust this CA to identify websites”) and restart the browser. This allows Burp to intercept HTTPS without browser warnings.Security caution: only install Burp’s CA in a dedicated testing profile or VM; remove it from normal/production profiles to avoid trusting a local CA inadvertently.Repeater tool — purpose: used for manual, iterative testing of a single request—edit, resend, and observe responses without redoing actions in the browser.Sending requests to Repeater: from Proxy Intercept or HTTP History use “Send to Repeater” (or Ctrl+R) to move a request into Repeater.Repeater workflow: edit the HTTP message in the text editor, press Go to send, and inspect response metadata (status, length, timing) and body to assess effects.Use cases for Repeater: manual vulnerability verification and PoC creation (e.g., testing XSS payloads, parameter tampering, SQLi strings) by injecting payloads and observing returned HTML/headers.Round-trip to browser for client validation: after modifying a request in Repeater you can generate/replay a URL in the browser to validate client-side behavior (useful for DOM/XSS checks).Practical recommendations: verify proxy and CA settings with a simple request first, keep scope/legal authorization documented, and use an isolated VM/profile for all interception tasks.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more16minPlay
November 12, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 3: Burp Suite: Web Security Testing and Target Scope ConfigurationIn this lesson, you’ll learn about:Burp Suite — definition & purpose: a Java-based web-application penetration testing framework by PortSwigger used to discover attack vectors and security flaws.Supported platforms & editions: runs on Windows, macOS, and Linux; available as a Free (Community) edition with limited features and a paid Professional edition with full capabilities.Overall architecture & UI model: a collection of specialized tools organized in tabs (Proxy, Target, Scanner, Intruder, Spider, Repeater, Decoder, Comparer, etc.) that work together in a user-driven workflow.Key components & what they do:Proxy (interception): capture and modify HTTP/S traffic between browser and server.Scanner: perform automated security tests and produce findings/reports (Professional feature).Intruder: automated attacks such as fuzzing, brute-forcing, or parameter manipulation.Spider: crawl the application to map pages and discover endpoints.Repeater: manually resend and tweak requests to observe server behavior.Decoder: encode/decode and analyze encoded or encrypted strings (e.g., tokens, session IDs).Comparer: diff two responses to highlight differences.Workflow role: how these tools combine — use Proxy/Spider for discovery, Scanner/Intruder for automated checks, Repeater/Decoder/Comparer for manual verification and PoC development.Defining scope (legal & safe testing): why and how to define in-scope targets to avoid unintended or illegal testing; configure scope in the Target → Scope settings.Scope configuration fields: protocol (any / HTTP / HTTPS), host or IP (single host, domain, or range), port, and file/path criteria.Using regular expressions in scope rules: express precise conditions with regex tokens (e.g., ^ start, $ end, \ escapes) to include or exclude specific hosts, ports, or file paths.Effect of scope on Burp operations: scope rules control which requests/actions Burp will perform or allow — properly defined scope limits risk and ensures testing stays within authorized boundaries.Practical recommendation: always define conservative scope first, validate rules with test requests, and document authorization before launching intrusive tests.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
November 11, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 2: Program Types, Methodologies, and the Path to Becoming a HunterIn this lesson, you’ll learn about:Bug bounty programs: their purpose and structure as platforms rewarding ethical hackers for discovering and responsibly disclosing security vulnerabilities.Program types:Public programs — open to anyone, often including both white hat and black hat hackers; no certification required.Private programs — invite-only, restricted to trusted and skilled researchers with proven track records; typically limited to certified white hat professionals.Bug bounty methodologies: how professional hunters plan and execute effective testing strategies.1. Scope analysis: identifying and confirming in-scope assets before testing.2. Target selection: focusing on valid and relevant assets to save time.3. Automated reconnaissance: using scanners to assess whether targets have been tested recently.4. Application review: selecting targets that match your expertise (e.g., Python, Ruby on Rails).5. Fuzzing: sending varied payloads to discover vulnerabilities like SQL injection or XSS; also helps map backend structures.6. Exploitation & PoCs: crafting clear Proof of Concepts to demonstrate impact, improve validation speed, and increase bounty rewards.Becoming a bug bounty hunter:No formal certification or age requirement, but a deep understanding of web and mobile app technologies is essential.Start small — focus on web targets before moving to large, complex programs.Practice in safe virtual labs using intentionally vulnerable apps.Study how bug bounty platforms operate and avoid over-targeted companies (e.g., Google, Microsoft).Network with experts, attend security conferences, join communities, and collaborate in teams for better results.Maintain a continuous learning mindset — stay updated on new tools, blogs, and attack techniques to remain competitive.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more13minPlay
November 11, 2025Course 1 - BurpSuite Bug Bounty Web Hacking from Scratch | Episode 1: Installing Burp Suite, OWASP BWA, and Bee-Box (Bwapp)In this lesson, you’ll learn about:Setting up a web security testing lab to practice web application security, pentesting, and exploiting common web vulnerabilities.Burp Suite — installation & overview: Java requirement (Oracle Java), download from portswigger.net, available editions: Community (free, limited/no scanners/payloads) and Professional (paid, includes passive/active scanners and built-in payloads), and installation options (Windows executables or cross-platform JAR).OWASP Broken Web Applications (BWA): purpose as a vulnerable VM for learning and testing; requires VirtualBox and is imported as a ready OS image (no new VM creation); includes apps like WebGoat and Mutillidae; default VM credentials (root / OWSP DWA).Bee-Box (Bwapp) VM: Bee-Box ships with bwapp (deliberately insecure web app) for hands-on practice; covers OWASP Top 10 flaws and other common issues; practice modes (low/medium/high); downloaded from SourceForge and run in virtualization software (e.g., VMware); access via VM IP and default bwapp creds (B / bug).Practical workflow: use Burp Suite as the main inspection/proxy tool against the vulnerable VMs (BWA, Bee-Box) to practice discovery, exploitation, and remediation techniques.Learning goal / metaphor: this episode provides your core toolkit — the primary assessment tool (Burp Suite) and two practice targets (BWA and Bee-Box) for safe, repeatable skill development.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy...more15minPlay
FAQs about CyberCode Academy:How many episodes does CyberCode Academy have?The podcast currently has 128 episodes available.