Master Security Testing with OWASP ZAP | Pentest web applications effectively
The ZAP is a fine-grained tool that every penetration testers, hacker, developers must have in their arsenal and hence required a solid understanding and through training to perform security testing from its core. ZAP can work with and integrate with many tools in the hacking, penetration testing segment such as SQLmap, Nmap, Burp suite, Nikto and every tool inside kali Linux. Invoking with burp gives much flexibility to combine the power of ZAP and burp suite at the same time and incomplete order.
[+] Some special features of the ZAP
· Quickstart using “point and shoot”
· Intercepting proxy with liked browser
· Proxying through zap then scanning
· Manual testing with automated testing
· ZAP HUD mode, to test apps and attack in a single page
· Attack modes for different use cases.
· Active scanning with passive scanning
· A requester for Manual testing
· Plug-n-hack support
· Can be easily integrated into CI/CD
· Powerful REST-based API
· Traditional AJAX spider
· Support for the wide range of scripting languages
· Smart card support
· Port scanning
· Parameter analysis
· Invoking and using other apps I.e: Burp suite
· Session management
· Anti-CSRF token handling
· Dynamic SSL certificates support
And much more...
[+] Course materials
· Offline access to read PDF slides
· 8+ Hours of Videos lessons
· Self-paced HTML/Flash
· Access from PC, TABLETS, SMARTPHONES.
· PDF Slide
[+] Below are the Vulnerabilities that ZAP security tests against a web application & webserver to hunt for loopholes
Path Traversal, Remote File Inclusion, Source Code Disclosure - /WEB-INF folder, Server Side Include, Cross-Site Scripting (Reflected)
Cross-Site Scripting (Persistent) - Prime, Cross-Site Scripting (Persistent) - Spider, Cross-Site Scripting (Persistent), SQL Injection
Server-Side Code Injection, Remote OS Command Injection, Directory Browsing, External Redirect, Buffer Overflow Medium
Format String Error, CRLF Injection Medium, Parameter Tampering, Script Active Scan Rules, Remote Code Execution - Shell Shock
Anti CSRF Tokens Scanner, Heartbleed OpenSSL Vulnerability, Cross-Domain Misconfiguration, Source Code Disclosure - CVE-2012-1823
Remote Code Execution - CVE-2012-1823, Session Fixation, SQL Injection - MySQL, SQL Injection - Hypersonic SQL, SQL Injection - Oracle
SQL Injection - PostgreSQL, Advanced SQL Injection, XPath Injection, XML External Entity Attack, Generic Padding Oracle
Expression Language Injection, Source Code Disclosure - SVN, Backup File Disclosure, Integer Overflow Error, Insecure HTTP Method
HTTP Parameter Pollution scanner, Possible Username Enumeration, Source Code Disclosure - Git, Source Code Disclosure - File Inclusion
Httpoxy - Proxy Header Misuse, LDAP Injection, SQL Injection - SQLite, Cross-Site Scripting (DOM Based), SQL Injection - MsSQL
Example Active Scanner: Denial of Service, An example active scan rule which loads data from a file, Cloud Metadata Potentially Exposed
Relative Path Confusion, Apache Range Header DoS, User-Agent Fuzzer, HTTP Only Site, Proxy Disclosure, ELMAH Information Leak
Trace.axd Information, .htaccess Information, .env Information Leak, XSLT Injection.