Skip to content
This repository has been archived by the owner on May 29, 2024. It is now read-only.

Latest commit

 

History

History
11 lines (6 loc) · 1.09 KB

step-3.md

File metadata and controls

11 lines (6 loc) · 1.09 KB

Step 3 - Optional Extensions

3.1 Challenge - Integrate AWS WAF datapoints to AWS Security Hub

3.2 Play with the OWASP Juice Shop.

  • The sample application you deployed is the OWASP Juice Shop. It intentionally contains common web vulnerabilities. WAF automatically protects against some of these vulnerabilities, such as SQL Injection and Cross Site Scriptting. There is an accompanying book by Ben Kimminitch that explains further. Try exploring the site to test out some other vulnerabilities. Access your EC2 resource directly (bypassing the ALB) to test your attacks without the WAF protection.