Make URL for product tampering challenge configurable
See original GitHub issueInstead of useForProductTamperingChallenge: true
is should be urlForProductTamperingChallenge: https://www.owasp.org/index.php/O-Saft
by default which can be overwritten with an arbitrary URL. The URL to change it into should still statically be http://kimminich.de
, of course! 😁
Issue Analytics
- State:
- Created 6 years ago
- Comments:6 (2 by maintainers)
Top Results From Across the Web
Customization - Pwning OWASP Juice Shop
OWASP Juice Shop can be customized in its product inventory and look ... Defines configuration options for the hacking challenges within the Juice...
Read more >What are parameter tampering cyber attacks? - TechTarget
Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization.
Read more >Product Tampering (Broken Access Control) - YouTube
Change the href of the link within the OWASP SSL Advanced Forensic Tool (O-Saft) product description into https://owasp.slack.com.
Read more >Access control vulnerabilities and privilege escalation
If an attacker can use the GET (or another) method to perform actions on a restricted URL, then they can circumvent the access...
Read more >owasp-mastg/0x05c-Reverse-Engineering-and-Tampering.md ...
However, there are also a few Android-specific challenges. ... but not the original source code) can get pretty close to white-box testing.
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Addresed this in #444
@bkimminich Thanks! I’ll go through the links you suggested!