Table of Contents Preface Introduction 1.1 Why OWASP Juice Shop exists 1.2 Architecture overview 1.3 Part I - Hacking preparations Hacking preparations 2.1 Running OWASP Juice Shop 2.2 Vulnerability categories 2.3 Challenge tracking 2.4 Hacking exercise rules 2.5 Walking the "happy path" 2.6 Customization 2.7 Hosting a CTF event 2.8 Part II - Challenge hunting Challenge hunting 3.1 Finding the Score Board 3.2 Injection 3.3 Broken Authentication 3.4 Forgotten Content 3.5 Roll your own Security 3.6 Sensitive Data Exposure 3.7 XML External Entities (XXE) 3.8 Improper Input Validation 3.9 Broken Access Control 3.10 Security Misconfiguration 3.11 2 Cross Site Scripting (XSS) 3.12 Insecure Deserialization 3.13 Vulnerable Components 3.14 Security through Obscurity 3.15 Race Condition 3.16 Part III - Getting involved Getting involved 4.1 Provide feedback 4.2 Contribute to development 4.3 Codebase 101 4.4 Help with translation 4.5 Donations 4.6 Appendix Appendix A - Challenge solutions 5.1 Appendix B - Trainer's guide 5.2 Postface About this book 6.1 3 Introduction Pwning OWASP Juice Shop Written by Björn Kimminich 4 Introduction 5 Introduction This is the official companion guide to the OWASP Juice Shop application. Being a web application with a vast number of intended security vulnerabilities, the OWASP Juice Shop is supposed to be the opposite of a best practice or template application for web developers: It is an awareness, training, demonstration and exercise tool for security risks in modern web applications. The OWASP Juice Shop is an open-source project hosted by the non-profit Open Web Application Security Project (OWASP) and is developed and maintained by volunteers. The content of this book was written for v8.1.1 of OWASP Juice Shop. A major rewrite for version 8.x is currently ongoing! Several hints and solutions are still for the 7.x version and might not work as-is on 8.x! The content will be incrementally updated for 8.x only on GitBook! To download the last edition of this book that is fully compatible with 7.x, please visit https://leanpub.com/juice-shop. LeanPub will not be re-published before the transition to 8.x is completed. The book is divided into three parts: Part I - Hacking preparations Part one helps you to get the application running and to set up optional hacking tools. Part II - Challenge hunting Part two gives an overview of the vulnerabilities found in the OWASP Juice Shop including hints how to find and exploit them in the application. Part III - Getting involved Part three shows up various ways to contribute to the OWASP Juice Shop open source project. Please be aware that this book is not supposed to be a comprehensive introduction to Web Application Security in general. For every category of vulnerabilities present in the OWASP Juice Shop you will find a brief explanation - typically by quoting and referencing to existing content on the given topic. Download a .pdf, .epub, or .mobi file from: https://leanpub.com/juice-shop (official release) 6 Introduction https://www.gitbook.com/book/bkimminich/pwning-owasp-juice-shop Read the book online at: https://bkimminich.gitbooks.io/pwning-owasp-juice-shop/content Contribute content, suggestions, and fixes on GitHub: https://github.com/bkimminich/pwning-juice-shop Official OWASP Juice Shop project homepage: http://owasp-juice.shop This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. 7 Why OWASP Juice Shop exists Why the Juice Shop exists To the unsuspecting user the Juice Shop just looks like a small online shop which sells surprise! - fruit & vegetable juice and associated products. Except for the entirely overrated payment and delivery aspect of the e-commerce business, the Juice Shop is fully functional. But this is just the tip of the iceberg. The Juice Shop contains 73 challenges of varying difficulty where you are supposed to exploit underlying security vulnerabilities. These vulnerabilities were intentionally planted in the application for exactly that purpose, but in a way that actually happens in "real-life" web development as well! Your hacking progress is tracked by the application using immediate push notifications for successful exploits as well as a score board for progress overview. Finding this score board is actually one of the (easiest) challenges! The idea behind this is

pdf文档 OWASP pwning owasp juice shop 英文版

安全报告 > OWASP > 文档预览
中文文档 248 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共248页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
OWASP pwning owasp juice shop 英文版 第 1 页 OWASP pwning owasp juice shop 英文版 第 2 页 OWASP pwning owasp juice shop 英文版 第 3 页
下载文档到电脑,方便使用
本文档由 SC2022-10-20 13:03:32上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。