By @rosinni and other contributors at 4Geeks Academy
Estas instrucciones están disponibles en 🇪🇸 español 🇪🇸
OWASP Top 10 is a list of the most critical security vulnerabilities in web applications. Each of these vulnerabilities represents a weakness that can be exploited by attackers to gain unauthorized access, steal sensitive information, or compromise the integrity of an application.
In this activity, we will use the BeeBox virtual machine, which contains the vulnerable bWAPP application, to explore and exploit the vulnerabilities included in the OWASP Top 10. Through this exercise, you will gain practical insight into how the OWASP Top 10 vulnerabilities can be exploited.
Objectives
We need you! These exercises are built and maintained in collaboration with contributors like yourself. If you find any bugs or misspellings, please contribute and/or report them.
Clone this repository in your debian virtual machine (how to clone this repository) and follow the steps below:
1$ npm i @learnpack/learnpack -g
1$ learnpack start
Thanks goes to these wonderful people (emoji key):
Rosinni Rodriguez (rosinni) contribution: (build-tutorial) ✅, (documentation) 📖
Alejandro Sanchez (alesanchezr), contribution: (bug reports) 🐛
This project follows the all-contributors specification. Contributions of any kind are welcome!
This and many other exercises are built by students as part of the 4Geeks Academy Coding Bootcamp by Alejandro Sánchez and many other contributors. Find out more about our Full Stack Developer Course, and Data Science Bootcamp.You can alse deepdive in the world of cybersecurity with our Cybersecurity Bootcamp