{"id":4299,"date":"2023-11-21T16:00:44","date_gmt":"2023-11-21T15:00:44","guid":{"rendered":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=4299"},"modified":"2023-11-21T16:02:11","modified_gmt":"2023-11-21T15:02:11","slug":"juice-shop","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop","title":{"rendered":"Juice Shop, la ctf que todo hacker deber\u00eda hacer"},"content":{"rendered":"\n<p>En la <strong>ciberseguridad<\/strong>, como hacker \u00e9ticos, tenemos que practicar nuestras capacidades sobre entornos controlados como con la m\u00e1quina <strong>Juice Shop<\/strong>. Si quieres conocer m\u00e1s sobre ella, te invitamos a quedarte en este art\u00edculo. Te contaremos todos los detalles sobre qu\u00e9 es\u00a0<strong>Juice Shop\u00a0<\/strong>y c\u00f3mo utilizarla. \u00a1Vamos all\u00e1!<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_72 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\/#%C2%BFQue_es_Juice_Shop_con_Owasp\" title=\"\u00bfQu\u00e9 es Juice Shop con Owasp?\">\u00bfQu\u00e9 es Juice Shop con Owasp?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\/#Un_poco_de_historia_sobre_Juice_Shop\" title=\"Un poco de historia sobre Juice Shop\">Un poco de historia sobre Juice Shop<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\/#Arquitectura_de_Owasp_Juice_Shop\" title=\"Arquitectura de Owasp Juice Shop\u00a0\">Arquitectura de Owasp Juice Shop\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\/#No_estas_solo\" title=\"No est\u00e1s solo\">No est\u00e1s solo<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\/#Caracteristicas_de_los_desafios_de_Juice_Shop\" title=\"Caracter\u00edsticas de los desaf\u00edos de Juice Shop\">Caracter\u00edsticas de los desaf\u00edos de Juice Shop<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\/#Conclusion_sobre_Juice_Shop\" title=\"Conclusi\u00f3n sobre Juice Shop\">Conclusi\u00f3n sobre Juice Shop<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"%C2%BFQue_es_Juice_Shop_con_Owasp\"><\/span><strong>\u00bfQu\u00e9 es Juice Shop con Owasp?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Juice Shop<\/strong> es un proyecto de <strong>c\u00f3digo abierto<\/strong> desarrollado por la comunidad de OWASP con el prop\u00f3sito de <strong>ofrecer un entorno de entrenamiento realista y desafiante para mejorar las habilidades de ciberseguridad<\/strong>. Este entorno emula una tienda online con muchos fallos de seguridad, por lo que proporciona a los estudiantes de una zona de pruebas donde pueden practicar t\u00e9cnicas, descubrir y estudiar vulnerabilidades del mundo real.<\/p>\n<p>Adem\u00e1s, <strong>Juice Shop es una CTF (Capture The Flag),<\/strong> lo cual si las hacemos en TryHackMe nos permite verificar que hemos completado los desaf\u00edos una vez hayamos encontrado las banderas.<\/p>\n<p>Tambi\u00e9n nos sirve como <strong>una forma de gamificar el trabajo del hacking \u00e9tico,<\/strong> aunque puede confundir con la idea de un pentesting real ya que en un caso real, no vas a tener nunca una bandera como tal con la que encuentres la informaci\u00f3n que necesitas cuando est\u00e9s haciendo este tipo de auditor\u00eda a una empresa.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Un_poco_de_historia_sobre_Juice_Shop\"><\/span><strong>Un poco de historia sobre Juice Shop<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Esta web comenz\u00f3 a desarrollarse en septiembre de 2014 y utiliza muchas plataformas de parte de servidor como <strong>ASP\/JSP\/Servlet. Y<\/strong> seg\u00fan fueron pasando los a\u00f1os, otras vulnerabilidades m\u00e1s nuevas fueron integr\u00e1ndose a esta p\u00e1gina web. Con el objetivo de que este proyecto ense\u00f1ara todas las vulnerabilidades de aplicaciones web que uno pueda aprender a identificar o explotar.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Arquitectura_de_Owasp_Juice_Shop\"><\/span><strong>Arquitectura de Owasp Juice Shop\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Esta p\u00e1gina web utiliza JavaScript y TypeScript junto a librer\u00edas frontend y frameworks como angular. Act\u00faa como una aplicaci\u00f3n de \u00fanica p\u00e1gina. Y su arquitectura tiene una interfaz excepcional de los componentes de Angular Material y el Googles Material Desing.<\/p>\n<p>El backend utiliza SQLite, una app express hospedada en un servidor node.js<\/p>\n<p>Sus funcionalidades con el cliente residen en una API REST.<\/p>\n<p>Tambi\u00e9n de base de datos utiliza de sistema MarsDB, que viene derivado de MongoDB.<\/p>\n<p>Adem\u00e1s, presenta una implementaci\u00f3n de OAuth 2.0 para registrarse.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"No_estas_solo\"><\/span><strong>No est\u00e1s solo<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Hay muchas maneras de ir trabajando OWASP Juice Shop. La instalaci\u00f3n de esta m\u00e1quina o arrancarla es bastante sencillo con nociones inform\u00e1ticas; sin embargo, yo recomiendo arrancarla en <a href=\"https:\/\/tryhackme.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">TryHackMe<\/a>, ya que\u00a0no tienes que configurar nada.<\/p>\n<p>Luego, es normal que te puedas atrancar en los diferentes desaf\u00edos conforme vayas trabajando sobre esta p\u00e1gina web. Hay un mont\u00f3n de gu\u00edas y una comunidad muy activa con la que puedes ir gui\u00e1ndote en caso de atrancarte aunque siempre hay que intentarlo uno primero para aprender.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Caracteristicas_de_los_desafios_de_Juice_Shop\"><\/span>Caracter\u00edsticas de los desaf\u00edos de Juice Shop<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Juice Shop tiene una din\u00e1mica de desaf\u00edos que se dividen en varias dificultades o estrellas seg\u00fan el tipo de vulnerabilidad que tenemos que sacar.<\/p>\n<p>Por ejemplo los triviales son los m\u00e1s f\u00e1ciles, que solo dan una estrella al completarlos, son los siguientes:<\/p>\n<ul>\n<li>Confidential Document: Accedemos a un documento confidencial<\/li>\n<li>Error Handling: Tenemos que estresar un error ya que no se comporta correctamente.<\/li>\n<li>Privacy Policy: Solo tenemos que leer las pol\u00edticas de seguridad<\/li>\n<li>Redirects Tier 1: Tenemos que redireccionar a un sitio de donaci\u00f3n que ya no est\u00e1 activo.<\/li>\n<li>Repetitive Registration:.<\/li>\n<li>Score Board: Encontrar la Score Board escondida.<\/li>\n<li>XSS Tier 0: Tenemos que ejecutar un ataque XSS con &lt;iframe src = \u00abjavascript:alert(`xss`)\u00bb&gt; .<\/li>\n<li>XSS Tier 1: Tenemos que ejecutar un ataque DOM XSS con &lt;iframe src = \u00abjavascript:alert(xss)\u00bb&gt; .<\/li>\n<li>Zero Stars: Dar valoraciones de 0 estrellas a la tienda.<\/li>\n<\/ul>\n<p>Luego tenemos los desaf\u00edos f\u00e1ciles que son de dos estrellas, que tenemos:<\/p>\n<ul>\n<li>Admin Section: Tenemos que acceder a la parte de administraci\u00f3n de la tienda.<\/li>\n<li>Basket Access Tier 1: Tenemos que ver la cesta de compra de otro usuario.<\/li>\n<li>Deprecated Interface: Tenemos que utilizar una interfaz deprecada.<\/li>\n<li>Five-Star Feedback: Eliminar todas las rese\u00f1as de 5 estrellas.<\/li>\n<li>Login Admin: Tenemos que iniciar sesi\u00f3n como el administrador<\/li>\n<li>Login MC SafeSearch: Tenemos que iniciar sesi\u00f3n con el usuario MC SafeSearch sin utilizar inyecciones SQL.\u00a0<\/li>\n<li>Password Strength: Tenemos que iniciar sesi\u00f3n con los credenciales del administrador sin usar inyecciones SQL.<\/li>\n<li>Security Policy: Hay que ser \u00e9ticos siempre y mirar las pol\u00edticas de seguridad.<\/li>\n<li>Weird Crypto: Tenemos que informar a la tienda de un algoritmo que no funciona de la manera que deber\u00eda.<\/li>\n<li>XSS Tier 1.5: Se realiza un ataque xss con este script &lt;script&gt; alert(xss) &lt;\/script&gt; en una p\u00e1gina legacy de la aplicaci\u00f3n.<\/li>\n<\/ul>\n<p>Tambi\u00e9n tenemos los desaf\u00edos de 3 estrellas que ya son de mayor dificultad y va escalando hasta los desaf\u00edos de 6 estrellas que ya son los m\u00e1s dif\u00edciles<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion_sobre_Juice_Shop\"><\/span><strong>Conclusi\u00f3n sobre Juice Shop<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Juice Shop<\/strong> se destaca como una <strong>herramienta bastante educativa en el contexto de la ciberseguridad<\/strong> que conecta directamente con las vulnerabilidades destacadas en <strong>OWASP TOP 10<\/strong>.<\/p>\n<p>El uso<strong> de Capture The Flag<\/strong> y un <strong>enfoque \u00e9tico hace que Juice Shop<\/strong> sea una opci\u00f3n espectacular para mejorar en <strong>ciberseguridad<\/strong>. Los profesionales o estudiantes fortalecen su comprensi\u00f3n de las vulnerabilidades y de la responsabilidad necesaria sobre este tema, ya que nos encontramos en un contexto muy tecnol\u00f3gico y la seguridad es tambi\u00e9n un factor clave en este.<\/p>\n<p>Si te ha interesado el art\u00edculo <a href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-rios\/\" target=\"_blank\" rel=\"noopener\">aqu\u00ed<\/a> puedes ver otros art\u00edculos de programaci\u00f3n y ciberseguridad<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfConoces Juice Shop? \u00a1Te presentamos la CTF que todo hacker deber\u00eda hacer! Entra y descubre todos los detalles con INESEM.<\/p>\n","protected":false},"author":91961,"featured_media":4300,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"class_list":["post-4299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desarrollo-de-aplicaciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Juice Shop, la ctf que todo hacker deber\u00eda hacer<\/title>\n<meta name=\"description\" content=\"\u00bfConoces Juice Shop? \u00a1Te presentamos la CTF que todo hacker deber\u00eda hacer! Entra y descubre todos los detalles con INESEM.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Juice Shop, la ctf que todo hacker deber\u00eda hacer\" \/>\n<meta property=\"og:description\" content=\"\u00bfConoces Juice Shop? \u00a1Te presentamos la CTF que todo hacker deber\u00eda hacer! Entra y descubre todos los detalles con INESEM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-21T15:00:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-21T15:02:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Juan R\u00edos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan R\u00edos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\"},\"author\":{\"name\":\"Juan R\u00edos\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5\"},\"headline\":\"Juice Shop, la ctf que todo hacker deber\u00eda hacer\",\"datePublished\":\"2023-11-21T15:00:44+00:00\",\"dateModified\":\"2023-11-21T15:02:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\"},\"wordCount\":951,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png\",\"articleSection\":[\"Desarrollo de Aplicaciones\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\",\"name\":\"Juice Shop, la ctf que todo hacker deber\u00eda hacer\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png\",\"datePublished\":\"2023-11-21T15:00:44+00:00\",\"dateModified\":\"2023-11-21T15:02:11+00:00\",\"description\":\"\u00bfConoces Juice Shop? \u00a1Te presentamos la CTF que todo hacker deber\u00eda hacer! Entra y descubre todos los detalles con INESEM.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png\",\"width\":1680,\"height\":1080,\"caption\":\"Juice Shop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desarrollo de Aplicaciones\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/desarrollo-de-aplicaciones\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Juice Shop, la ctf que todo hacker deber\u00eda hacer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5\",\"name\":\"Juan R\u00edos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png\",\"caption\":\"Juan R\u00edos\"},\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-rios\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Juice Shop, la ctf que todo hacker deber\u00eda hacer","description":"\u00bfConoces Juice Shop? \u00a1Te presentamos la CTF que todo hacker deber\u00eda hacer! Entra y descubre todos los detalles con INESEM.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop","og_locale":"es_ES","og_type":"article","og_title":"Juice Shop, la ctf que todo hacker deber\u00eda hacer","og_description":"\u00bfConoces Juice Shop? \u00a1Te presentamos la CTF que todo hacker deber\u00eda hacer! Entra y descubre todos los detalles con INESEM.","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2023-11-21T15:00:44+00:00","article_modified_time":"2023-11-21T15:02:11+00:00","og_image":[{"width":1680,"height":1080,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png","type":"image\/png"}],"author":"Juan R\u00edos","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"Juan R\u00edos","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop"},"author":{"name":"Juan R\u00edos","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5"},"headline":"Juice Shop, la ctf que todo hacker deber\u00eda hacer","datePublished":"2023-11-21T15:00:44+00:00","dateModified":"2023-11-21T15:02:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop"},"wordCount":951,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png","articleSection":["Desarrollo de Aplicaciones"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop","name":"Juice Shop, la ctf que todo hacker deber\u00eda hacer","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png","datePublished":"2023-11-21T15:00:44+00:00","dateModified":"2023-11-21T15:02:11+00:00","description":"\u00bfConoces Juice Shop? \u00a1Te presentamos la CTF que todo hacker deber\u00eda hacer! Entra y descubre todos los detalles con INESEM.","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02.png","width":1680,"height":1080,"caption":"Juice Shop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/juice-shop#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"Desarrollo de Aplicaciones","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/desarrollo-de-aplicaciones"},{"@type":"ListItem","position":3,"name":"Juice Shop, la ctf que todo hacker deber\u00eda hacer"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/60415ccb9331166b75a8c7ca7c59d0f5","name":"Juan R\u00edos","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/Rios-Juan-recorte-96x96.png","caption":"Juan R\u00edos"},"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-rios"}]}},"autor_name":{"name":"Juan R\u00edos"},"featured_image":{"attachment_meta":{"width":1680,"height":1080,"file":"2023\/11\/screenshot02.png","sizes":{"medium":{"file":"screenshot02-175x113.png","width":175,"height":113,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-175x113.png"},"large":{"file":"screenshot02-1020x656.png","width":1020,"height":656,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-1020x656.png"},"thumbnail":{"file":"screenshot02-345x180.png","width":345,"height":180,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-345x180.png"},"medium_large":{"file":"screenshot02-768x494.png","width":768,"height":494,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-768x494.png"},"wysija-newsletters-max":{"file":"screenshot02-600x386.png","width":600,"height":386,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-600x386.png"},"1536x1536":{"file":"screenshot02-1536x987.png","width":1536,"height":987,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-1536x987.png"},"thumb-small":{"file":"screenshot02-80x80.png","width":80,"height":80,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-80x80.png"},"thumb-standard":{"file":"screenshot02-320x320.png","width":320,"height":320,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-320x320.png"},"thumb-medium":{"file":"screenshot02-520x245.png","width":520,"height":245,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-520x245.png"},"thumb-large":{"file":"screenshot02-720x340.png","width":720,"height":340,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-720x340.png"},"thumb-anteriores":{"file":"screenshot02-230x163.png","width":230,"height":163,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-230x163.png"},"thumb-inverso":{"file":"screenshot02-369x261.png","width":369,"height":261,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-369x261.png"},"thumb-cercano":{"file":"screenshot02-650x200.png","width":650,"height":200,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-650x200.png"},"thumb-slider":{"file":"screenshot02-574x430.png","width":574,"height":430,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-574x430.png"},"thumb-busqueda":{"file":"screenshot02-580x375.png","width":580,"height":375,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-580x375.png"},"thumb-formacion-continua":{"file":"screenshot02-440x336.png","width":440,"height":336,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-440x336.png"},"thumb-xlarge":{"file":"screenshot02-980x450.png","width":980,"height":450,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-980x450.png"},"thumb-xxlarge":{"file":"screenshot02-1320x500.png","width":1320,"height":500,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/11\/screenshot02-1320x500.png"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4299"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/91961"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=4299"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/4300"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=4299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=4299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}