Follow this link for instructions on how to install it on your system (e.g., the Kali VM). The OWASP teams maintain this flawed web app for educational purposes. We’ll use the OWASP Juice Shop, “the most modern and sophisticated insecure web application,” as the vulnerable target. In that perspective, the OWASP top ten could be helpful to define goals and organize a complete work session, but here we’ll demonstrate just a few vulnerabilities. You can install the Burp suite on your system or use the prepackaged version in Kali Linux, but that won’t tell you what to do with it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |