Completed
★ ★ ★ Reset Jim's Password (Broken Authentication)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Hack OWASP Juice Shop - A Guided Walkthrough Showing All Solutions
Automatically move to the next video in the Classroom when playback concludes
- 1 ★ Zero Stars (Improper Input Validation)
- 2 ★ Confidential Document (Sensitive Data Exposure)
- 3 ★ DOM XSS (XSS)
- 4 ★ Error Handling (Security Misconfiguration)
- 5 ★ Missing Encoding (Improper Input Validation)
- 6 ★ Outdated Whitelist (Unvalidated Redirects)
- 7 ★ Privacy Policy (Miscellaneous)
- 8 ★ Repetitive Registration (Improper Input Validation)
- 9 ★ ★ Login Admin (Injection)
- 10 ★ ★ Classic Stored XSS (XSS)
- 11 ★ ★ Admin Section (Broken Access Control)
- 12 ★ ★ Deprecated Interface (Security Misconfiguration)
- 13 ★ ★ Five Star Feedback (Broken Access Control)
- 14 ★ ★ Login MC SafeSearch (Sensitive Data Exposure)
- 15 ★ ★ Password Strength (Broken Authentication)
- 16 ★ ★ Security Policy (Miscellaneous)
- 17 ★ ★ View Basket (Broken Access Control)
- 18 ★ ★ Weird Crypto (Cryptographic Issues)
- 19 ★ ★ ★ API-Only XSS (XSS)
- 20 ★ ★ ★ Admin Registration (Improper Input Validation)
- 21 ★ ★ ★ Björn's Favorite Pet (Broken Authentication)
- 22 ★ ★ ★ Captcha Bypass (Broken Anti Automation)
- 23 ★ ★ ★ Client-side XSS Protection (XSS)
- 24 ★ ★ ★ Database Schema (Injection)
- 25 ★ ★ ★ Forged Feedback (Broken Access Control)
- 26 ★ ★ ★ Forged Review (Broken Access Control)
- 27 ★ ★ ★ GDPR Data Erasure (Broken Authentication)
- 28 ★ ★ ★ Login Amy (Sensitive Data Exposure)
- 29 ★ ★ ★ Login Bender (Injection)
- 30 ★ ★ ★ Login Jim (Injection)
- 31 ★ ★ ★ Manipulate Basket (Broken Access Control)
- 32 ★ ★ ★ Payback Time (Improper Input Validation)
- 33 ★ ★ ★ Privacy Policy Inspection (Security through Obscurity)
- 34 ★ ★ ★ Product Tampering (Broken Access Control)
- 35 ★ ★ ★ Reset Jim's Password (Broken Authentication)
- 36 ★ ★ ★ Upload Size (Improper Input Validation)
- 37 ★ ★ ★ Upload Type (Improper Input Validation)
- 38 ★★★★ Access Log (Sensitive Data Exposure)
- 39 ★★★★ Ephemeral Accountant (SQL-Injection)
- 40 ★★★★ Expired Coupon (Improper Input Validation)
- 41 ★★★★ Forgotten Developer Backup (Sensitive Data Exposure)
- 42 ★★★★ Forgotten Sales Backup (Sensitive Data Exposure)
- 43 ★★★★ GDPR Data Theft (Sensitive Data Exposure)
- 44 ★★★★ Legacy Typosquatting (Vulnerable Components)
- 45 ★★★★ Login Bjoern (Broken Authentication)
- 46 ★★★★ Misplaced Signature File (Sensitive Data Exposure)
- 47 ★★★★ Nested Easter Egg (Cryptographic Issues)
- 48 ★★★★ NoSql Manipulation (Injection)
- 49 ★★★★★ Change Benders Password (Broken Authentication)
- 50 ★★★★★ Extra Language (Broken Anti Automation)