Pwning Juiceshop (CTF Friendly)
Preface
Introduction
Why OWASP Juice Shop exists
Architecture overview
Part I - Hacking preparations
Hacking preparations
Vulnerability categories
Challenge tracking
Hacking exercise rules
Walking the "happy path"
Part II - Challenge hunting
Challenge hunting
Finding the Score Board
Injection
Broken Authentication
Forgotten Content
Roll your own Security
Sensitive Data Exposure
XML External Entities (XXE)
Improper Input Validation
Broken Access Control
Security Misconfiguration
Cross Site Scripting (XSS)
Insecure Deserialization
Vulnerable Components
Security through Obscurity
Race Condition
Part III - Getting involved
Getting involved
Donations
Postface
About this book
Powered by
GitBook
About this book
results matching "
"
No results matching "
"