首页 > 编程语言 >OWASP ZAP介绍

OWASP ZAP介绍

时间:2022-12-16 17:36:24浏览次数:53  
标签:web request 介绍 server Attack Proxy OWASP ZAP

Zed Attack Proxy is an open-source security software written in Java programming language and released in 2010. It is used to scan web applications and find vulnerabilities in it. It was started as a small project by the Open Web Application Security Project (OWASP) and now it is the most active project maintained by thousands of individuals around the globe. It is available for Linux, Windows, and mac in 29 languages. It can also be used as a proxy server like a burp suite to manipulate the request including the HTTPS request. Daemon mode is also present in it which can later be controlled by REST API. 

Features:

  • Passive Scanner
  • Automated Scanner
  • Proxy Server
  • Port Identification
  • Directory Searching
  • Brute Force Attack
  • Web Crawler
  • Fuzzer

Why do we use Zed Attack Proxy? Zed Attack Proxy is used to detect vulnerabilities present on any web server and try to remove them. Here is some big vulnerability that could be present in the web server:

  • SQL injection
  • Cross-site scripting (XSS)
  • Broken access control
  • Security miss-configuration
  • Broken authentication
  • Sensitive data exposure
  • Cross-site request forgery (CSRF)
  • Using components with known vulnerabilities.

Some Important Terminologies:

  • Proxy Server: It is a server that acts as a mediator for clients who want to go through the request and want to alter them.
  • Spider: It is a type of information gathering process in which the application in this case ZAP will go through the whole web page and try to find out all the links and other important details.
  • Passive Scan: In this type of scanning the vulnerability is detected without getting in direct contact with the target machine.
  • Active Scan: In this, the vulnerability is detected by getting in direct contact with the target machine which makes it very easy to be detected by the administrator.

Working Process: First we set up the proxy server with any browser. The browser sends website data to the proxy server and then the browser inside the ZAP process the request and perform attacks and generates the report.

 

官方feature教程:https://www.zaproxy.org/zap-in-ten/

TODO:要试用下,并且和BurpSuit对比下

标签:web,request,介绍,server,Attack,Proxy,OWASP,ZAP
From: https://www.cnblogs.com/saaspeter/p/16987906.html

相关文章