You are on page 1of 8

UNIVERSITY OF PETROLEUM AND ENERGY STUDIES

DEHRADUN

Ethical Hacking & Penetration Testing Lab


Assignment 2

BTECH-COMPUTER SCIENCE
ENGINEERING (HONS.)
CYBER SECURITY AND FORENSICS
BATCH: B2 (Hons.)

Name: Jigesh Sheoran


SAP ID: 500086199
Enrolment No: R2142201569
OBJECTIVE:
- Working with a VM (Kali / Parrot OS)
- Set up OWASP Juice shop on it, https://github.com/bkimminich/juice-shop
- Once set up is complete, perform Cross Site Request Forgery (CSRF). To know more
about CSRF, you may visit – https://owasp.org/www-community/attacks/csrf
- Attach the proper screenshots along with the proof of CSRF exploited.

1. Clone the OWASP Juice Shop Repository:


The first step is to clone the OWASP Juice Shop repository from GitHub. Cloning a
repository means creating a local copy of the repository on your system.
This command will download the entire OWASP Juice Shop source code from the
specified GitHub URL and create a new directory named juice-shop in your current
directory.
2. Navigate to the Cloned Directory:
After cloning the repository, you need to navigate to the directory where the OWASP
Juice Shop source code is located.
3. Once you're inside the juice-shop directory, you'll find various files and folders
containing the OWASP Juice Shop source code and configuration files.
4. To set up OWASP Juice Shop, you need to follow the instructions provided in the
project's README file.
5. Once the server is running, you can access OWASP Juice Shop from your web
browser by navigating to the specified URL (e.g., http://localhost:3000).

6. I was unable to open the server so i stopped the experiment here.

Name: Jigesh Sheoran


SAP Id: 500086199

You might also like