Introduction

This is the official companion guide to the OWASP Juice Shop application. Being a web application with a vast number of intended security vulnerabilities, the OWASP Juice Shop is supposed to be the opposite of a best practice or template application for web developers: It is an awareness, training, demonstration and exercise tool for security risks in modern web applications. The OWASP Juice Shop is an open-source project hosted by the non-profit Open Worldwide Application Security Project® (OWASP) and is developed and maintained by volunteers. The content of this book was written for v17.2.0-SNAPSHOT of OWASP Juice Shop.

The book is divided into five parts:

Part I - Hacking preparations

Part one helps you to get the application running and to set up optional hacking tools.

Part II - Challenge hunting

Part two gives an overview of the vulnerabilities found in the OWASP Juice Shop including hints how to find and exploit them in the application.

Part III - Getting involved

Part three points out various ways to contribute to the OWASP Juice Shop open source project.

Part IV - Advanced user guides

Part four contains a troubleshooting section alongside guides on custom theming, Capture-the-Flags as well as technical integration, monitoring and a trainer’s guidance.

Part V - Advanced developer guides

Part five gives detailed guidance on special "behind the scenes" topics like cheat detection or coding challenge implementation.


Please be aware that this book is not supposed to be a comprehensive introduction to Web Application Security in general. For every category of vulnerabilities present in the OWASP Juice Shop you will find a brief explanation - typically by quoting and referencing to existing content on the given topic.


Read the companion guide online at:

Download a .pdf or .epub file from:

Contribute content, suggestions, and fixes on GitHub:

Official OWASP Juice Shop project homepage:


CC BY-NC-ND 4.0

Open Worldwide Application Security Project and OWASP are registered trademarks of the OWASP Foundation, Inc. This work is Copyright © by Bjoern Kimminich and licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.