🌐𝐖𝐄𝐁 𝐏𝐓 - 𝐉𝐔𝐈𝐂𝐄 𝐒𝐇𝐎𝐏 (𝐇𝐨𝐰 𝐭𝐨 𝐇𝐚𝐜𝐤 𝐀𝐦𝐲’𝐬 𝐋𝐨𝐠𝐢𝐧? 🔑💻 | 𝐎𝐖𝐀𝐒𝐏 𝐉𝐮𝐢𝐜𝐞 𝐒𝐡𝐨𝐩 𝐄𝐱𝐩𝐥𝐨𝐢𝐭! )🚀
Автор: WEB - MICH JOSH CYBERSECURITY
Загружено: 2025-03-13
Просмотров: 171
Описание:
we’ll explore a Sensitive Data Exposure vulnerability in OWASP Juice Shop by attempting to log in as Amy..
📌 Steps Covered:
✅ Google Search: Look up '93.83 billion trillion trillion centuries', click the first result, scroll down, and find the password: D0g.....................
✅ Login Attempt: Using [email protected], but the credentials fail due to an incorrect email or password.
✅ Burp Suite Interception: Capture the login request, analyze the response, and manipulate the data.
✅ Repeater & Intruder: Modify the request, set payloads, start the attack, extract the correct password, and log in successfully!
𝐘𝐎𝐔𝐓𝐔𝐁𝐄 (𝐌𝐈𝐂𝐇 𝐉𝐎𝐒𝐇 𝐂𝐘𝐁𝐄𝐑𝐒𝐄𝐂𝐔𝐑𝐈𝐓𝐘)
/ @mich_josh_cybersecurity
🔔 Subscribe for more ethical hacking tutorials! 🖥️
#MICHJOSHCYBERSECURITY#OWASP #JuiceShop #EthicalHacking #CyberSecurity #BugBounty #Pentesting #BugBountyTips #InfoSec #CTF #BurpSuite #HackingTutorial #WebSecurity #Vulnerability #Hacker #CTFHacking #DataExposure
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: