Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
26 views6 pages

OWASP Juice Shop Security Audit Guide

The Capstone Project involves conducting a security audit of the OWASP Juice Shop application to identify vulnerabilities and propose solutions for enhancing security. Students will set up the application in a Windows environment, evaluate compliance with data protection principles, and document their findings in a professional report. The project aims to provide hands-on experience with web security concepts relevant to digital marketing platforms.

Uploaded by

aldikhalid151
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views6 pages

OWASP Juice Shop Security Audit Guide

The Capstone Project involves conducting a security audit of the OWASP Juice Shop application to identify vulnerabilities and propose solutions for enhancing security. Students will set up the application in a Windows environment, evaluate compliance with data protection principles, and document their findings in a professional report. The project aims to provide hands-on experience with web security concepts relevant to digital marketing platforms.

Uploaded by

aldikhalid151
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Capstone Project: Web Security

Audit Using OWASP Juice Shop


Dr EKODECK Stéphane
Academic Year: 2024 – 2025

Objective
The objective of this project is to conduct a security audit of OWASP Juice
Shop, an intentionally vulnerable web application, using a Windows envi-
ronment. Students will identify vulnerabilities, evaluate compliance with
data protection principles, and propose actionable solutions to enhance
security.

Project Description
OWASP Juice Shop replicates common vulnerabilities found in real-world
web applications, such as injection flaws, weak authentication, and insecure
cookie configurations. This project involves:

1. Setting up OWASP Juice Shop on a Windows system.

2. Identifying vulnerabilities using browser tools and Juice Shop’s built-


in challenges.

3. Documenting findings in a professional report with screenshots.

4. Proposing actionable solutions for the identified risks.

Requirements
Before starting the project, ensure the following tools and software are
installed on your Windows system:

1
• Docker Desktop for Windows: For running Juice Shop locally.
Download from: https://www.docker.com/products/docker-desktop/.

• Google Chrome or Mozilla Firefox: For accessing Juice Shop


and using developer tools.

• Text Editor: For writing the report (e.g., Microsoft Word or Notepad++).

• Optional Tools:

– Burp Suite Community Edition: To intercept and analyze HTTP


traffic.
– Sucuri SiteCheck: For scanning the website.

2
Setup Instructions for OWASP Juice Shop
Step 1: Install Docker Desktop on Windows
1. Download Docker Desktop from https://www.docker.com/products/
docker-desktop/. 2. Follow the installation instructions provided on the
website. 3. After installation, launch Docker Desktop and ensure it is
running.

Step 2: Pull and Run Juice Shop


1. Open Command Prompt (search for ”cmd” in the Start menu). 2.
Pull the Juice Shop Docker image by running the following command:
d o c k e r p u l l bkimminich / j u i c e −shop
3. Start the Juice Shop container using this command:
d o c k e r run −d −p 3 0 0 0 : 3 0 0 0 bkimminich / j u i c e −shop
4. Open your browser and navigate to http://localhost:3000/ to access
Juice Shop.

Step 3: Verify the Setup


• Ensure the Juice Shop homepage loads correctly.

• Test the challenges dashboard by clicking on the Score Board link


in the application.

3
Audit Steps
Step 1: Analyze the Platform
Explore Juice Shop and identify vulnerabilities. Focus on:

• Login and Authentication:

– Test for weak passwords.


– Attempt to bypass login mechanisms.

• Input Fields:

– Check for injection vulnerabilities (e.g., SQL Injection).


– Try injecting JavaScript to exploit XSS.

• Cookies and Session Management:

– Inspect cookies using browser developer tools.


– Verify if cookies have secure flags like ‘HttpOnly‘ and ‘Secure‘.

Step 2: Evaluate Compliance with Data Protection


Regulations
Check the following:

• Presence of a cookie consent banner.

• Availability of a privacy policy.

• Secure handling of sensitive user data.

Step 3: Simulate Attacks


Use developer tools to perform basic simulated attacks:

• Inspect and modify HTTP requests to test for security gaps.

• Identify areas where user input is improperly sanitized.

4
Deliverables
Security Audit Report
Prepare a structured report with the following sections:

• Introduction:

– Brief description of OWASP Juice Shop.


– Purpose of the audit.

• Findings:

– List of vulnerabilities discovered (e.g., weak passwords, missing


cookie flags).
– Screenshots and descriptions of each issue.

• Proposed Solutions:

– Specific recommendations for fixing each vulnerability.


– Suggested tools or configurations (e.g., enabling ‘HttpOnly‘ for
cookies).

• Conclusion:

– Summary of key issues and their potential impact.


– Steps for further improving security.

Presentation
Prepare a 10-minute presentation summarizing:

• Key findings from the audit.

• Proposed solutions.

• Visual aids such as screenshots or diagrams.

5
Evaluation Criteria
• Thoroughness of Audit: Coverage of all key areas (login, cookies,
input fields, etc.).

• Accuracy of Findings: Clear and correct identification of vulner-


abilities.

• Actionable Solutions: Practicality and effectiveness of proposed


fixes.

• Report Quality: Clarity, detail, and organization of the document.

• Presentation Quality: Professionalism, clarity, and use of visuals.

Conclusion
By completing this project, students will gain hands-on experience with
web security concepts relevant to digital marketing platforms. They will
learn to identify vulnerabilities, evaluate risks, and implement solutions to
enhance platform security.

You might also like