SlideShare a Scribd company logo
Dave Sweigert, CISSP, CISA, PMP, Security+ 
OWASP (Zed Attack Proxy) 
Securing Web Apps with a 
quasi-man-in-the-middle (MitM) attack tool 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 1
Firefox configured to use proxy 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 2
FireFox Menu -- Tools – Options – Network -- Settings 
Set the host to localhost and the port to 8080, these are the 
default ZAP proxy ports. Use these settings for all protocols. 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 3
To enable 
FireFox 
Plug-in click 
Plug-n-Hack 
within the 
Quick Start 
Tab. 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 4
Configure automatic plug-in within FireFox 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 5
MANUAL intervention (using a Plug-N-Hack web page in 
the FireFox browser) allows manual testing of web 
services (e.g. SQL injection, etc.). 
These are manual tests typically run by a “human” 
penetration tester or software quality assurance (SQA) 
tester. 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 6
Test Results Compiled 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 7
References: 
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project 
11/25/2014 OWASP Zed Attack Proxy (ZAP) 8

More Related Content

PPTX
OWASP Zed Attack Proxy
PPTX
Learn to pen-test with OWASP ZAP
PPTX
Security Testing - Zap It
ODP
JavaOne 2014 Security Testing for Developers using OWASP ZAP
PDF
ODP
2014 ZAP Workshop 1: Getting Started
ODP
OWASP Zed Attack Proxy Demonstration - OWASP Bangalore Nov 22 2014
ODP
Automating OWASP ZAP - DevCSecCon talk
OWASP Zed Attack Proxy
Learn to pen-test with OWASP ZAP
Security Testing - Zap It
JavaOne 2014 Security Testing for Developers using OWASP ZAP
2014 ZAP Workshop 1: Getting Started
OWASP Zed Attack Proxy Demonstration - OWASP Bangalore Nov 22 2014
Automating OWASP ZAP - DevCSecCon talk

What's hot (20)

PDF
Zed Attack Proxy (ZAP)
PDF
N Different Strategies to Automate OWASP ZAP - OWASP APPSec BUCHAREST - Oct 1...
PDF
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
ODP
Practical Security Testing for Developers using OWASP ZAP at Dot Net Bangalor...
PDF
N Different Strategies to Automate OWASP ZAP - Cybersecurity WithTheBest - Oc...
ODP
BlackHat 2014 OWASP ZAP Turbo Talk
ODP
BSides Manchester 2014 ZAP Advanced Features
ODP
OWASP 2012 AppSec Dublin ZAP Intro
ODP
2014 ZAP Workshop 2: Contexts and Fuzzing
ODP
2017 Codemotion OWASP ZAP in CI/CD
PDF
2020 ADDO Spring Break OWASP ZAP Automation
ODP
OWASP 2013 APPSEC USA Talk - OWASP ZAP
ODP
OWASP 2014 AppSec EU ZAP Advanced Features
ODP
2017 DevSecCon ZAP Scripting Workshop
ODP
OWASP 2013 Limerick - ZAP: Whats even newer
ODP
AllDayDevOps ZAP automation in CI
PDF
2021 ZAP Automation in CI/CD
ODP
OWASP 2013 EU Tour Amsterdam ZAP Intro
PPTX
Zap vs burp
PPTX
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline
Zed Attack Proxy (ZAP)
N Different Strategies to Automate OWASP ZAP - OWASP APPSec BUCHAREST - Oct 1...
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Practical Security Testing for Developers using OWASP ZAP at Dot Net Bangalor...
N Different Strategies to Automate OWASP ZAP - Cybersecurity WithTheBest - Oc...
BlackHat 2014 OWASP ZAP Turbo Talk
BSides Manchester 2014 ZAP Advanced Features
OWASP 2012 AppSec Dublin ZAP Intro
2014 ZAP Workshop 2: Contexts and Fuzzing
2017 Codemotion OWASP ZAP in CI/CD
2020 ADDO Spring Break OWASP ZAP Automation
OWASP 2013 APPSEC USA Talk - OWASP ZAP
OWASP 2014 AppSec EU ZAP Advanced Features
2017 DevSecCon ZAP Scripting Workshop
OWASP 2013 Limerick - ZAP: Whats even newer
AllDayDevOps ZAP automation in CI
2021 ZAP Automation in CI/CD
OWASP 2013 EU Tour Amsterdam ZAP Intro
Zap vs burp
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline
Ad

Similar to Using the Zed Attack Proxy as a Web App testing tool (20)

PDF
installing-and-setting-up-your-zap-environment-slides.pdf
PPT
Zap attack proxy
ODP
JoinSEC 2013 London - ZAP Intro
PPT
AppSec EU 2011 - An Introduction to ZAP by Simon Bennetts
PDF
Automated Security Testing
PPTX
The OWASP Zed Attack Proxy
PPTX
OWASP ZAP API Automation
PPTX
ZAP @FOSSASIA2015
PPTX
PPTX
Security testing using zap
PDF
GECon2017_ Security testing and selenium tests can you do one using the other...
PPTX
OWASP ZAP Workshop for QA Testers
PPTX
Security testautomation
PPT
Automating security test using Selenium and OWASP ZAP - Practical DevSecOps
PDF
DAST in CI/CD pipelines using Selenium & OWASP ZAP
ODP
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
PPTX
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
PPTX
Slides St. Clair College Forensics Cyber Security
PPTX
Cyber ppt
PDF
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
installing-and-setting-up-your-zap-environment-slides.pdf
Zap attack proxy
JoinSEC 2013 London - ZAP Intro
AppSec EU 2011 - An Introduction to ZAP by Simon Bennetts
Automated Security Testing
The OWASP Zed Attack Proxy
OWASP ZAP API Automation
ZAP @FOSSASIA2015
Security testing using zap
GECon2017_ Security testing and selenium tests can you do one using the other...
OWASP ZAP Workshop for QA Testers
Security testautomation
Automating security test using Selenium and OWASP ZAP - Practical DevSecOps
DAST in CI/CD pipelines using Selenium & OWASP ZAP
OWASP 2013 AppSec EU Hamburg - ZAP Innovations
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
Slides St. Clair College Forensics Cyber Security
Cyber ppt
AnitaB-Atlanta-CyberSecurity-Weekend-Rana-Khalil.pdf
Ad

More from David Sweigert (20)

PDF
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
PDF
Law Enforcement Cyber Incident Reporting
PDF
Sample Network Analysis Report based on Wireshark Analysis
PDF
National Cyber Security Awareness Month poster
PDF
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
PDF
National Cyber Security Awareness Month - October 2017
PDF
California Attorney General Notification Penal Code 646.9
PDF
Congressional support of Ethical Hacking and Cyber Security
PDF
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
PDF
Application of Racketeering Law to Suppress CrowdStalking Threats
PDF
Canada Communications Security Establishment - Threat Vector Chart
DOCX
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
PDF
Cyber Incident Response Team NIMS Public Comment
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
National Incident Management System (NIMS) NQS DRAFT
PDF
National Incident Management System - NQS Public Feedback
DOCX
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
PDF
National Preparedness Goals 2015 2nd edition
PDF
Healthcare Sector-wide Disaster Prepardness Plan
PDF
Cyber Risk Assessment for the Emergency Services Sector - DHS
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
Law Enforcement Cyber Incident Reporting
Sample Network Analysis Report based on Wireshark Analysis
National Cyber Security Awareness Month poster
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
National Cyber Security Awareness Month - October 2017
California Attorney General Notification Penal Code 646.9
Congressional support of Ethical Hacking and Cyber Security
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
Application of Racketeering Law to Suppress CrowdStalking Threats
Canada Communications Security Establishment - Threat Vector Chart
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team - NIMS - Public Comment
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System - NQS Public Feedback
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
National Preparedness Goals 2015 2nd edition
Healthcare Sector-wide Disaster Prepardness Plan
Cyber Risk Assessment for the Emergency Services Sector - DHS

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Using the Zed Attack Proxy as a Web App testing tool