Task 27 [Severity 9] Components With Known Vulnerabilities - Intro
Read above.
No answer needed
Task 28 [Severity 9] Components With Known Vulnerabilities - Exploit
Read the above!
No answer needed
Task 29 [Severity 9] Components With Known Vulnerabilities - Lab
How many characters are in /etc/passwd (use wc -c /etc/passwd to get the answer)
HINT: You know its a bookstore application, you should check for recent unauthenticated bookstore app rce's.
Task 30 [Severity 10] Insufficient Logging and Monitoring
Task 31 What Next?
Donate to the OWASP Foundation!
Read the above!
No answer needed
OWASP Logo
This room breaks each category in the project down and includes details on what the vulnerability is, how it occurs and how you can exploit it. You will put the theory into practise by completing supporting challenges.