

Introduction.
Episode 1 - Enumeration.
Episode 2 - Enumeration, XSS, and UI Bypassing.
Episode 3 - XSS, SQL Injection, and Broken Access Control.
Episode 4 - XXE, Input Validation, Broken Access Control, and More XSS.
Episode 5 - SQL Injections and Live Bug Bounty Hunting.