How to Hack OWASP Juice Shop - A Guided Walkthrough Showing All Solutions

How to Hack OWASP Juice Shop - A Guided Walkthrough Showing All Solutions

Hacksplained via YouTube Direct link

★ Zero Stars (Improper Input Validation)

1 of 50

1 of 50

★ Zero Stars (Improper Input Validation)

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

How to Hack OWASP Juice Shop - A Guided Walkthrough Showing All Solutions

Automatically move to the next video in the Classroom when playback concludes

  1. 1 ★ Zero Stars (Improper Input Validation)
  2. 2 ★ Confidential Document (Sensitive Data Exposure)
  3. 3 ★ DOM XSS (XSS)
  4. 4 ★ Error Handling (Security Misconfiguration)
  5. 5 ★ Missing Encoding (Improper Input Validation)
  6. 6 ★ Outdated Whitelist (Unvalidated Redirects)
  7. 7 ★ Privacy Policy (Miscellaneous)
  8. 8 ★ Repetitive Registration (Improper Input Validation)
  9. 9 ★ ★ Login Admin (Injection)
  10. 10 ★ ★ Classic Stored XSS (XSS)
  11. 11 ★ ★ Admin Section (Broken Access Control)
  12. 12 ★ ★ Deprecated Interface (Security Misconfiguration)
  13. 13 ★ ★ Five Star Feedback (Broken Access Control)
  14. 14 ★ ★ Login MC SafeSearch (Sensitive Data Exposure)
  15. 15 ★ ★ Password Strength (Broken Authentication)
  16. 16 ★ ★ Security Policy (Miscellaneous)
  17. 17 ★ ★ View Basket (Broken Access Control)
  18. 18 ★ ★ Weird Crypto (Cryptographic Issues)
  19. 19 ★ ★ ★ API-Only XSS (XSS)
  20. 20 ★ ★ ★ Admin Registration (Improper Input Validation)
  21. 21 ★ ★ ★ Björn's Favorite Pet (Broken Authentication)
  22. 22 ★ ★ ★ Captcha Bypass (Broken Anti Automation)
  23. 23 ★ ★ ★ Client-side XSS Protection (XSS)
  24. 24 ★ ★ ★ Database Schema (Injection)
  25. 25 ★ ★ ★ Forged Feedback (Broken Access Control)
  26. 26 ★ ★ ★ Forged Review (Broken Access Control)
  27. 27 ★ ★ ★ GDPR Data Erasure (Broken Authentication)
  28. 28 ★ ★ ★ Login Amy (Sensitive Data Exposure)
  29. 29 ★ ★ ★ Login Bender (Injection)
  30. 30 ★ ★ ★ Login Jim (Injection)
  31. 31 ★ ★ ★ Manipulate Basket (Broken Access Control)
  32. 32 ★ ★ ★ Payback Time (Improper Input Validation)
  33. 33 ★ ★ ★ Privacy Policy Inspection (Security through Obscurity)
  34. 34 ★ ★ ★ Product Tampering (Broken Access Control)
  35. 35 ★ ★ ★ Reset Jim's Password (Broken Authentication)
  36. 36 ★ ★ ★ Upload Size (Improper Input Validation)
  37. 37 ★ ★ ★ Upload Type (Improper Input Validation)
  38. 38 ★★★★ Access Log (Sensitive Data Exposure)
  39. 39 ★★★★ Ephemeral Accountant (SQL-Injection)
  40. 40 ★★★★ Expired Coupon (Improper Input Validation)
  41. 41 ★★★★ Forgotten Developer Backup (Sensitive Data Exposure)
  42. 42 ★★★★ Forgotten Sales Backup (Sensitive Data Exposure)
  43. 43 ★★★★ GDPR Data Theft (Sensitive Data Exposure)
  44. 44 ★★★★ Legacy Typosquatting (Vulnerable Components)
  45. 45 ★★★★ Login Bjoern (Broken Authentication)
  46. 46 ★★★★ Misplaced Signature File (Sensitive Data Exposure)
  47. 47 ★★★★ Nested Easter Egg (Cryptographic Issues)
  48. 48 ★★★★ NoSql Manipulation (Injection)
  49. 49 ★★★★★ Change Benders Password (Broken Authentication)
  50. 50 ★★★★★ Extra Language (Broken Anti Automation)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.