Welcome to my Vulnerability Assessment & Penetration Testing (VAPT) project focused on OWASP Juice Shop β one of the most popular intentionally vulnerable web applications. This repository demonstrates how common web security vulnerabilities can be discovered and exploited in a controlled environment using ethical hacking practices.
juice-shop-vapt/
βββ Findings/
β βββ injection/
β β βββ admin-login-sqli.md
β β βββ no-sql-manipulation.md
β β βββ union-sqli.md
β βββ xss/
β β βββ dom-xss.md
β β βββ reflected-xss.md
β β βββ bonus-paylaod.md
β βββ broken-access-control/
β β βββ Forged-Feedback.md
β β βββ View-Another-User-Basket.md
β β βββ review-edit.md
β βββ idor/
β β βββ order-access.md
β β βββ invoice-download.md
β β βββ order-modify.md
β βββ sensitive-data-exposure/
β β βββ confidentail-document.md
β β βββ login-MCsafesearch.md
β β βββ NFT-Takeover.md
β βββ security-misconfiguration/
β β βββ Error-Handling.md
β β βββ Deprecated-Interface.md
β β βββ cors.md
β βββ auth-session/
β βββ sql-bypass-login.md
β βββ reset-token-abuse.md
β βββ persistent-session.md
βββ Reports/
β βββ Screenshots/
β βββ Injection/
β βββ XSS/
β β βββ DOM/
β β βββ Reflected/
β β βββ Bonus/
β βββ BrokenAccessControl/
β βββ IDOR/
β βββ SensitiveDataExposure/
β βββ SecurityMisconfiguration/
β βββ AuthSession/
βββ Tools_Used.md
βββ README.md
# | Category | Sample Labs | Screenshot Folder |
---|---|---|---|
1 | Injection | Admin Login via SQLi, No-Sql-Manipulation, Union SQLi | Screenshots/Injection/ |
2 | Cross-Site Scripting | DOM XSS, Reflected XSS in Order Tracking, Bonus Payload | Screenshots/XSS/DOM , Reflected , Stored |
3 | Broken Access Control | Forged Feedback, View Otherβs Basket, Modify/Delete Review | Screenshots/BrokenAccessControl/ |
4 | IDOR | View Otherβs Orders, Download Invoice, Modify Order via URL | Screenshots/IDOR/ |
5 | Sensitive Data Exposure | Confidentail-Document, Login-MCsafesearch, NFT-TAkeover | Screenshots/SensitiveDataExposure/ |
6 | Security Misconfiguration | Error-Handling, Deprecated-Interface, Insecure CORS | Screenshots/SecurityMisconfiguration/ |
7 | Auth & Session Issues | SQL Login Bypass, Tokenless Password Reset, Persistent Session | Screenshots/AuthSession/ |
Each report contains payloads, Burp Suite steps, screenshots, vulnerability impact, and suggested mitigations.
Screenshots for each vulnerability are stored under:
Reports/Screenshots/<Category>/<Specific Attack>/
```markdown
π How to Use This Repository
Clone the repository: git clone https://github.com/lucky-cyber3008/juice-shop-vapt.git
Read vulnerability write-ups under the Findings/ folder organized by category.
Explore screenshots under Reports/Screenshots/ for PoC images.
Use this as a reference for learning, bug bounty prep, or VAPT methodology.
πββοΈ Author Lucky GitHub: @lucky-cyber3008 Cybersecurity Enthusiast | Bug Bounty Learner | Ethical Hacker in Training
π Disclaimer This repository is intended for educational and ethical use only. All vulnerabilities demonstrated are part of OWASP Juice Shop β an intentionally vulnerable web application. Do not attempt these techniques on unauthorized systems. Always act responsibly and legally.
π Want to dive into the code?
π Check out the GitHub Repository