This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Juice Shop Project"
From OWASP
Line 8: | Line 8: | ||
== OWASP Juice Shop Tool Project == | == OWASP Juice Shop Tool Project == | ||
− | OWASP Juice Shop is an intentionally insecure webapp for | + | OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire [[OWASP Top Ten]] and other severe security flaws. |
− | |||
− | |||
==Description== | ==Description== | ||
[[File:JuiceShop_Logo.png|left]] | [[File:JuiceShop_Logo.png|left]] | ||
− | |||
− | The application contains 28+ challenges where the user is supposed | + | Juice Shop is written in Node.js, Express and AngularJS. It was the first application written entirely in JavaScript listed in the [[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP VWA Directory]]. |
+ | |||
+ | The application contains 28+ challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. Finding this score board is actually one of the (easy) challenges! | ||
+ | |||
+ | Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a benchmark to check how well their tools cope with Javascript-heavy application frontends and REST APIs. | ||
+ | |||
+ | <blockquote>''Translating "dump" or "useless outfit" into German yields "Saftladen" which can be reverse-translated word by word into "juice shop". Hence the project name. That the initials "JS" match with those of "Javascript" was purely coincidental!''</blockquote> | ||
+ | |||
− | |||
− | |||
+ | == Application Architecture == | ||
+ | [[File:Architektur_JuiceShop.png]] | ||
== Screenshots == | == Screenshots == |