- Hacking preparations
- Running OWASP Juice Shop
- Vulnerability categories
- Challenge tracking
- Hacking exercise rules
- Walking the "happy path"
- Customization
- Hosting a CTF event
- Challenge hunting
- Finding the Score Board
- Injection
- Broken Authentication
- Forgotten Content
- Roll your own Security
- Sensitive Data Exposure
- XML External Entities (XXE)
- Improper Input Validation
- Broken Access Control
- Security Misconfiguration
- Cross Site Scripting (XSS)
- Insecure Deserialization
- Vulnerable Components
- Security through Obscurity
- Race Condition