This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Juice Shop Project"

From OWASP
Jump to: navigation, search
Line 8: Line 8:
 
== OWASP Juice Shop Tool Project ==
 
== OWASP Juice Shop Tool Project ==
  
OWASP Juice Shop is an intentionally insecure webapp for pentesting & security awareness trainings written entirely in Javascript. Its vulnerabilities encompass the entire [[OWASP Top Ten|OWASP Top Ten]] as well as business logic bugs and other severe programming mistakes.
+
OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire [[OWASP Top Ten]] and other severe security flaws.
 
 
<blockquote>''Translating "dump" or "useless outfit" into German yields "Saftladen" which can be reverse-translated word by word into "juice shop". Hence the project name. That the initials "JS" match with those of "Javascript" was purely coincidental!''</blockquote>
 
  
 
==Description==
 
==Description==
  
 
[[File:JuiceShop_Logo.png|left]]
 
[[File:JuiceShop_Logo.png|left]]
Juice Shop is written in Node.js, Express and AngularJS. It is the first application written entirely in JavaScript listed in the [[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP VWA Directory]]. It also seems to be the first broken web app that uses the currently popular architecture of a Single-Page-Application/Rich-Internet-Application frontend with a RESTful backend.
 
  
The application contains 28+ challenges where the user is supposed to use certain attacks to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. (Finding the score board is actually a challenge of its own...)
+
Juice Shop is written in Node.js, Express and AngularJS. It was the first application written entirely in JavaScript listed in the [[OWASP_Vulnerable_Web_Applications_Directory_Project|OWASP VWA Directory]].
 +
 
 +
The application contains 28+ challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. Finding this score board is actually one of the (easy) challenges!
 +
 
 +
Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a benchmark to check how well their tools cope with Javascript-heavy application frontends and REST APIs.
 +
 
 +
<blockquote>''Translating "dump" or "useless outfit" into German yields "Saftladen" which can be reverse-translated word by word into "juice shop". Hence the project name. That the initials "JS" match with those of "Javascript" was purely coincidental!''</blockquote>
 +
 
  
Juice Shop can be deployed and run as a Docker container, via a packaged distribution (for some popular node.js versions) or by cloning the repository and running it directly on your node.js installation.
 
  
Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a benchmark to check how well their tools cope with Javascript-heavy application frontends.
 
  
 +
== Application Architecture ==
  
 +
[[File:Architektur_JuiceShop.png]]
  
 
== Screenshots ==
 
== Screenshots ==

Revision as of 09:06, 29 July 2016

OWASP Project Header.jpg

OWASP Juice Shop Tool Project

OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws.

Description

JuiceShop Logo.png

Juice Shop is written in Node.js, Express and AngularJS. It was the first application written entirely in JavaScript listed in the OWASP VWA Directory.

The application contains 28+ challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. The hacking progress is tracked on a score board. Finding this score board is actually one of the (easy) challenges!

Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a benchmark to check how well their tools cope with Javascript-heavy application frontends and REST APIs.

Translating "dump" or "useless outfit" into German yields "Saftladen" which can be reverse-translated word by word into "juice shop". Hence the project name. That the initials "JS" match with those of "Javascript" was purely coincidental!



Application Architecture

Architektur JuiceShop.png

Screenshots

Juiceshop screenshot1.jpg Juiceshop screenshot2.jpg Juiceshop screenshot3.jpg Juiceshop screenshot4.jpg


Licensing

This program is free software: you can redistribute it and/or modify it under the terms of the MIT License. OWASP Juice Shop and any contributions are Copyright © by Bjoern Kimminich 2014-2016.

<paypal>Juice Shop</paypal>

Installation

Packaged Distributions

Docker Image

Online Demo (Heroku)

Source Code

GitHub Project

Revision History

Support

Documentation

Chat

Issue Tracker

Media

Introduction Slide Deck

Lightning Talk Slides

Auto-Hacking Video

Merchandise

Apparel (US/DE)

Stickers

Project Leader

Bjoern Kimminich @

Related Projects

Miscellaneous

OpenHub Project

Classifications

Project Type Files TOOL.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png