Skip main navigation

Exploitation

In this video, you will learn how to exploit authentication-only login using the OWASP Juice Shop.

In this video, you will learn how to exploit authentication-only login using the OWASP Juice Shop.

Now that you understand the difference between authorization and authentication, you are ready to follow the demonstration in this video. You will act as the hacker and will exploit the OWASP Juice Shop. What you learn here can be generalized to some other systems and will help you understand how a hacker may test your system.

Reflect and share: Go to OWASP Broken Authentication to see the OWASP table referred to in the video. Read through the additional information provided, and share your findings here.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now