In this video, I solve the OWASP Juice Shop chatbot challenge by exploiting an SSTI (Server-Side Template Injection) vulnerability. You’ll see how the chatbot can be bypassed and broken using simple techniques, along with a clear walkthrough of the process.
⚠️ Disclaimer
This video is created for educational and ethical hacking purposes only. All demonstrations are performed in a controlled environment (OWASP Juice Shop). Do not attempt these techniques on systems without proper authorization. Unauthorized testing is illegal.
—————————————————————————————————————————————–
📱 Socials:
X: https://twitter.com/medusa_0xf
Discord: https://discord.gg/2PUPD3RHHs
LinkedIn: https://www.linkedin.com/in/insha-j-38b822225/
Instagram: https://www.instagram.com/medusa_0xf/
Portfolio: https://portfolio.medusa0xf.com/
Bug Bounty WriteUps: https://medusa0xf.medium.com/
——————————————————————————————————————————————
#bugbounty #ai #pentesting #hackingcourse #infosec #cybersecurity #websecurity #portswigger #DOMInvader #securityresearch #ethicalhacking #vulnerability #exploit #javascript #webhacking #bugbountytips #reportwriting #zeroday #cve #idor #xss #oauth #chatgpt #owasp #owasptop10 #ssrf #recon #ethicalhacking #portswigger #owasp #bugbounty #cve #cybersecurity #graphql #apihacking #developer #hackerone #jwt #api #subdomain #portswigger #bugbounty #bola #postman #podcast #pentesting #api #hack #bola #tryhackme #hackerone
——————————————————————————————————————————————
massobeats – lush
massobeats – thoughts