TryHackMe OWASP Top 10 2025: Design Flaws Walkthrough
Explore A02, A03, A06, A10 and their relation to application design flaws in this comprehensive TryHackMe walkthrough. π

Djalil Ayed
7.8K views β’ Nov 16, 2025

About this video
π― Learn about A02, A03, A06, and A10 and how they related to design flaws in the application.
π·οΈπ·οΈ Room Link: https://tryhackme.com/room/owasptopten2025two
π― This room breaks each 4 of the OWASP Top 10 2025 categories. In this room, you will learn about the categories that are related to failures in architecture and system design. You will put the theory into practice by completing supporting challenges. The following categories are covered in this room:
π AS02: Security Misconfigurations
π AS03: Software Supply Chain Failures
π AS04: Cryptographic Failures
π AS06: Insecure Design
π― Room Tasks: π―
π Task 1: Introduction
π Task 2: AS02: Security Misconfigurations
- Navigate to 10[.]10[.]143[.]63[:]5002. It appears that the developers left too many traces in their User Management APIs.
π§ Task 3: AS03: Software Supply Chain Failures
- Navigate to 10[.]10[.]143[.]63[:]5003. The code is outdated and imports an old lib/vulnerable_utils.py component. Can you debug it?
π± Task 4: AS04: Cryptographic Failures
- Navigate to 10[.]10[.]143[.]63[:]5004. Can you find the key to decrypt the file?
π» Task 5: AS06: Insecure Design
- Navigate to 10[.]10[.]143[.]63[:]5005. Have they assumed that only mobile devices can access it?
π¦ Task 6: Conclusion
π― OWASP Top 10:2025 RC1 : https://owasp.org/Top10/2025/0x00_2025-Introduction/
β οΈ Educational Purpose Only
This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems.
Don't forget to π LIKE and π SUBSCRIBE for more cybersecurity tutorials!
#tryhackme #owasp #owasptop10
π·οΈπ·οΈ Room Link: https://tryhackme.com/room/owasptopten2025two
π― This room breaks each 4 of the OWASP Top 10 2025 categories. In this room, you will learn about the categories that are related to failures in architecture and system design. You will put the theory into practice by completing supporting challenges. The following categories are covered in this room:
π AS02: Security Misconfigurations
π AS03: Software Supply Chain Failures
π AS04: Cryptographic Failures
π AS06: Insecure Design
π― Room Tasks: π―
π Task 1: Introduction
π Task 2: AS02: Security Misconfigurations
- Navigate to 10[.]10[.]143[.]63[:]5002. It appears that the developers left too many traces in their User Management APIs.
π§ Task 3: AS03: Software Supply Chain Failures
- Navigate to 10[.]10[.]143[.]63[:]5003. The code is outdated and imports an old lib/vulnerable_utils.py component. Can you debug it?
π± Task 4: AS04: Cryptographic Failures
- Navigate to 10[.]10[.]143[.]63[:]5004. Can you find the key to decrypt the file?
π» Task 5: AS06: Insecure Design
- Navigate to 10[.]10[.]143[.]63[:]5005. Have they assumed that only mobile devices can access it?
π¦ Task 6: Conclusion
π― OWASP Top 10:2025 RC1 : https://owasp.org/Top10/2025/0x00_2025-Introduction/
β οΈ Educational Purpose Only
This content is for educational and authorized penetration testing purposes only. Always ensure you have permission before testing on any systems.
Don't forget to π LIKE and π SUBSCRIBE for more cybersecurity tutorials!
#tryhackme #owasp #owasptop10
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
7.8K
Likes
152
Duration
39:32
Published
Nov 16, 2025
User Reviews
4.6
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.