SlideShare a Scribd company logo
Zap Tool Execution
OWSAP ZAP
OWASP Zed Attack Proxy (ZAP) is an open-source web application security testing tool
developed by the Open Web Application Security Project (OWASP). It is designed to help
developers, security testers, and penetration testers identify vulnerabilities and security flaws
in web applications.
 Why is it used?
 It is a tool used to enhance the security of web applications. Just as the security
expert examines your building for vulnerabilities, using OWASP ZAP anyone with the
right knowledge can examine web applications for potential security flaws that could
be exploited by attackers.
 Scan for common security vulnerabilities, such as weak authentication mechanisms or input
validation issues.
 Identify security weaknesses in their web applications.
 Mitigate risks by fixing the identified vulnerabilities before they can be exploited by malicious
individuals.
Features of OWASP ZAP
ZAP offers a wide range of features to assist in the identification and mitigation of
web application vulnerabilities:
 Proxy Functionality: ZAP acts as a proxy between the user's browser and the
target web application, allowing it to intercept and inspect the requests and
responses exchanged. This enables the user to analyze and modify the
application's communication in real-time.
 Active Scanning: ZAP includes a comprehensive set of active scanning tools
that automatically test the target application for common security issues. These
scans can help identify vulnerabilities such as cross-site scripting (XSS), SQL
injection, and insecure direct object references.
 Passive Scanning: In addition to active scanning, ZAP performs passive
scanning by observing the application's traffic and detecting potential security
weaknesses. This includes identifying sensitive information leaks, insecure
cookie settings, and other issues that may not be identified through active
scanning alone.
 Spidering: ZAP's spidering functionality allows it to navigate through the target
application, discovering and mapping out the various pages and functionalities.
This helps in creating a comprehensive view of the application's structure, which
is useful for testing and identifying potential vulnerabilities.
 Authentication and Session Management: ZAP provides features to assist in
testing authentication and session management mechanisms. It allows users to
define different user roles, perform login/logout operations, and manage session
tokens to test the application's security controls effectively.
ZAP Desktop UI
1. Menu Bar – Provides access to many of the automated and manual tools.
2. Toolbar – Includes buttons which provide easy access to most
commonly used features.
3. Tree Window – Displays the Sites tree and the Scripts tree.
4. Workspace Window – Displays requests, responses, and scripts and
allows you to edit them.
5. Information Window – Displays details of the automated and manual
tools.
6. Footer – Displays a summary of the alerts found and the status of the
main automated tools.
Running an Automated Scan
 The easiest way to start using ZAP is via the Quick Start tab. Quick Start is a ZAP add-on that is
included automatically when you installed ZAP.
 To run a Quick Start Automated Scan :
1. Start ZAP and click the Quick Start tab of the Workspace Window.
2. Click the large Automated Scan button.
3. In the URL to attack text box, enter the full URL of the web application you want to attack.
4. Click the Attack
View Alerts and Alert Details
 The left-hand side of the Footer contains a count of
the Alerts found during your test, broken out into risk
categories. These risk categories are:
 To view the alerts created during your test:
 Click the Alerts tab in the Information Window.
 Click each alert displayed in that window to display
the URL and the vulnerability detected in the right
side of the Information Window.
 In the Workspace Windows, click the Response tab to
see the contents of the header and body of the
response. The part of the response that generated the
alert will be highlighted.
ZAP Tool Scan – Issues Types
 ZAP can scan through the web application and detect
issues related to:
• SQL injection
• Broken Authentication
• Sensitive data exposure
• Broken Access control
• Security misconfiguration
• Cross Site Scripting (XSS)
• Insecure Deserialization
• Components with known vulnerabilities
• Missing security headers
OWASP Cheat
Sheet Series
 The OWASP Cheat Sheet
Series was created to provide a
concise collection of high value
information on specific application
security topics
 URL:
https://cheatsheetseries.owasp.org/
 We can use the above URL to fix the
issues from ZAP tool scanning
Steps to Scan the Diff. JSON
Step:1
Steps to Scan the Diff. JSON
Step:2
Steps to Scan the Diff. JSON
Step:3
Restriction Methods – Attack of ZAP Tool
Resource
Whitelisting
Parameter
Whitelisting
Proper Return
Type
Improve / Add
DTO
Avoid Complex
Object
Parameters
Attribute
routing
Exception
Handling
Taking care of
response
content
URL and file
Injection
prevention

More Related Content

PDF
Zed Attack Proxy (ZAP)
DOCX
Demand for Penetration Testing Services.docx
PPT
OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10
PDF
website vulnerability scanner and reporter research paper
PDF
Web app penetration testing best methods tools used
PDF
All You Need to Know About Application Security Testing.pdf
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
PDF
Application Security Testing Benefits Value and Tools
Zed Attack Proxy (ZAP)
Demand for Penetration Testing Services.docx
OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10
website vulnerability scanner and reporter research paper
Web app penetration testing best methods tools used
All You Need to Know About Application Security Testing.pdf
Penetration Testing Services_ Comprehensive Guide 2024.pdf
Application Security Testing Benefits Value and Tools

Similar to OWSAP Zap Tool Execution - API Security Scan (20)

PPTX
Cyber ppt
PDF
The Web AppSec How-To: The Defender's Toolbox
DOC
Top 10 Web Vulnerability Scanners
PDF
Bug Bounty Guide Tools and Resource.pdf
PPTX
Evaluating Web App, Mobile App, and API Security - Matt Cohen
PDF
Digitdefence-PPT-Web Application Penetration Testing.pdf
PPTX
Web Application Penetration Testing Introduction
PPTX
Security by the numbers
PPTX
The QA Analyst's Hacker's Landmark Tour v3.0
PDF
vulnerability scanning and reporting tool
PPTX
PDF
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
PDF
OWASP Secure Coding Quick Reference Guide
PDF
HP WebInspect
PPTX
2 . web app s canners
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
PDF
Sa No Scan Paper
PDF
Penetration testing tools and phases
PDF
Security Testing Approach for Web Application Testing.pdf
DOCX
Vulnerability scanning project
Cyber ppt
The Web AppSec How-To: The Defender's Toolbox
Top 10 Web Vulnerability Scanners
Bug Bounty Guide Tools and Resource.pdf
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Digitdefence-PPT-Web Application Penetration Testing.pdf
Web Application Penetration Testing Introduction
Security by the numbers
The QA Analyst's Hacker's Landmark Tour v3.0
vulnerability scanning and reporting tool
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
OWASP Secure Coding Quick Reference Guide
HP WebInspect
2 . web app s canners
Hide and seek - Attack Surface Management and continuous assessment.
Sa No Scan Paper
Penetration testing tools and phases
Security Testing Approach for Web Application Testing.pdf
Vulnerability scanning project
Ad

Recently uploaded (20)

PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Digital Strategies for Manufacturing Companies
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Introduction to Artificial Intelligence
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
L1 - Introduction to python Backend.pptx
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Nekopoi APK 2025 free lastest update
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPT
Introduction Database Management System for Course Database
Design an Analysis of Algorithms II-SECS-1021-03
Digital Strategies for Manufacturing Companies
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
top salesforce developer skills in 2025.pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Introduction to Artificial Intelligence
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
CHAPTER 2 - PM Management and IT Context
L1 - Introduction to python Backend.pptx
Softaken Excel to vCard Converter Software.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
How to Choose the Right IT Partner for Your Business in Malaysia
Design an Analysis of Algorithms I-SECS-1021-03
Nekopoi APK 2025 free lastest update
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
How Creative Agencies Leverage Project Management Software.pdf
Odoo Companies in India – Driving Business Transformation.pdf
Introduction Database Management System for Course Database
Ad

OWSAP Zap Tool Execution - API Security Scan

  • 2. OWSAP ZAP OWASP Zed Attack Proxy (ZAP) is an open-source web application security testing tool developed by the Open Web Application Security Project (OWASP). It is designed to help developers, security testers, and penetration testers identify vulnerabilities and security flaws in web applications.  Why is it used?  It is a tool used to enhance the security of web applications. Just as the security expert examines your building for vulnerabilities, using OWASP ZAP anyone with the right knowledge can examine web applications for potential security flaws that could be exploited by attackers.  Scan for common security vulnerabilities, such as weak authentication mechanisms or input validation issues.  Identify security weaknesses in their web applications.  Mitigate risks by fixing the identified vulnerabilities before they can be exploited by malicious individuals.
  • 3. Features of OWASP ZAP ZAP offers a wide range of features to assist in the identification and mitigation of web application vulnerabilities:  Proxy Functionality: ZAP acts as a proxy between the user's browser and the target web application, allowing it to intercept and inspect the requests and responses exchanged. This enables the user to analyze and modify the application's communication in real-time.  Active Scanning: ZAP includes a comprehensive set of active scanning tools that automatically test the target application for common security issues. These scans can help identify vulnerabilities such as cross-site scripting (XSS), SQL injection, and insecure direct object references.  Passive Scanning: In addition to active scanning, ZAP performs passive scanning by observing the application's traffic and detecting potential security weaknesses. This includes identifying sensitive information leaks, insecure cookie settings, and other issues that may not be identified through active scanning alone.  Spidering: ZAP's spidering functionality allows it to navigate through the target application, discovering and mapping out the various pages and functionalities. This helps in creating a comprehensive view of the application's structure, which is useful for testing and identifying potential vulnerabilities.  Authentication and Session Management: ZAP provides features to assist in testing authentication and session management mechanisms. It allows users to define different user roles, perform login/logout operations, and manage session tokens to test the application's security controls effectively.
  • 4. ZAP Desktop UI 1. Menu Bar – Provides access to many of the automated and manual tools. 2. Toolbar – Includes buttons which provide easy access to most commonly used features. 3. Tree Window – Displays the Sites tree and the Scripts tree. 4. Workspace Window – Displays requests, responses, and scripts and allows you to edit them. 5. Information Window – Displays details of the automated and manual tools. 6. Footer – Displays a summary of the alerts found and the status of the main automated tools.
  • 5. Running an Automated Scan  The easiest way to start using ZAP is via the Quick Start tab. Quick Start is a ZAP add-on that is included automatically when you installed ZAP.  To run a Quick Start Automated Scan : 1. Start ZAP and click the Quick Start tab of the Workspace Window. 2. Click the large Automated Scan button. 3. In the URL to attack text box, enter the full URL of the web application you want to attack. 4. Click the Attack
  • 6. View Alerts and Alert Details  The left-hand side of the Footer contains a count of the Alerts found during your test, broken out into risk categories. These risk categories are:  To view the alerts created during your test:  Click the Alerts tab in the Information Window.  Click each alert displayed in that window to display the URL and the vulnerability detected in the right side of the Information Window.  In the Workspace Windows, click the Response tab to see the contents of the header and body of the response. The part of the response that generated the alert will be highlighted.
  • 7. ZAP Tool Scan – Issues Types  ZAP can scan through the web application and detect issues related to: • SQL injection • Broken Authentication • Sensitive data exposure • Broken Access control • Security misconfiguration • Cross Site Scripting (XSS) • Insecure Deserialization • Components with known vulnerabilities • Missing security headers
  • 8. OWASP Cheat Sheet Series  The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics  URL: https://cheatsheetseries.owasp.org/  We can use the above URL to fix the issues from ZAP tool scanning
  • 9. Steps to Scan the Diff. JSON Step:1
  • 10. Steps to Scan the Diff. JSON Step:2
  • 11. Steps to Scan the Diff. JSON Step:3
  • 12. Restriction Methods – Attack of ZAP Tool Resource Whitelisting Parameter Whitelisting Proper Return Type Improve / Add DTO Avoid Complex Object Parameters Attribute routing Exception Handling Taking care of response content URL and file Injection prevention