This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Juice Shop Project"
From OWASP
(→Road Map and Getting Involved) |
|||
Line 13: | Line 13: | ||
Juice Shop is written in Node.js, Express and AngularJS. It is the first application written entirely in JavaScript listed in the [[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP VWA Directory]]. It also seems to be the first broken web app that uses the currently popular architecture of a Single-Page-Application/Rich-Internet-Application frontend with a RESTful backend. | Juice Shop is written in Node.js, Express and AngularJS. It is the first application written entirely in JavaScript listed in the [[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP VWA Directory]]. It also seems to be the first broken web app that uses the currently popular architecture of a Single-Page-Application/Rich-Internet-Application frontend with a RESTful backend. | ||
+ | |||
+ | <blockquote>''Translating "dump" or "useless outfit" into German yields "Saftladen" which can be reverse-translated word by word into "juice shop". Hence the project name. That the initials "JS" match with those of "Javascript" was purely coincidental!''</blockquote> | ||
The application contains 28+ challenges where the user is supposed to use certain attacks to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. (Finding the score board is actually a challenge of its own...) | The application contains 28+ challenges where the user is supposed to use certain attacks to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. (Finding the score board is actually a challenge of its own...) |