User Tools
Writing /app/www/public/data/meta/testing/penetration_testing_with_owasp_zap.meta failed
testing:penetration_testing_with_owasp_zap
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| testing:penetration_testing_with_owasp_zap [2018/09/27 15:15] – created cokeeffe | testing:penetration_testing_with_owasp_zap [2021/06/25 10:09] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | =====OSWAP Zed Attack Proxy===== | ||
| + | OSWAP Zed Attack Proxy (ZAP) is a penetration testing tool. We can use it to test for vulnerabilities in applications. | ||
| + | |||
| + | ====Using ZAP==== | ||
| + | |||
| + | ZAP is very quick and easy to get up and running. Download ZAP from [[https:// | ||
| + | |||
| + | ===Quick Scan=== | ||
| + | After starting you should see a quick start page similar to this: | ||
| + | {{ : | ||
| + | |||
| + | |||
| + | This (and an application to test against) is all you need to start a quick, simple test. **N.B.: Never run penetration tests against a production application, | ||
| + | |||
| + | To actually start a test just enter the URL of the test application into the "URL to attack" | ||
| + | |||
| + | ===Results=== | ||
| + | {{ : | ||
| + | |||
| + | ===Browser Testing=== | ||
| + | ZAP won't be able to get past the login screen on its own, but you can configure your browser to use ZAP as a proxy, allowing it to intercept and analyse requests as you explore the application in the browser yourself. | ||
| + | |||
| + | To configure go to the Options window for ZAP and go to the Dynamic SSL Certificates section. Generate a new cert and use the Save button to export it somewhere on your file system. | ||
| + | {{ : | ||
| + | |||
| + | Then go to the Local Proxies section of the options and make sure the address is set to localhost and the port to a free port (default is 8080). | ||
| + | {{ : | ||
| + | |||
| + | In your browser import the certificate you saved and set the proxy to match what you configured in ZAP. How to do this depends on your browser. | ||
| + | |||
| + | Then just explore the application on your browser as thoroughly as you can, as you do ZAP will record all requests and continue to look for vulnerabilities. | ||
| + | {{ : | ||