http://www.owasp.org

Europe 2011

An Introduction to ZAP The OWASP Zed Attack Proxy Simon Bennetts Sage UK Ltd OWASP ZAP Project Lead [email protected]

The Introduction

•  The statement •  You cannot build secure

web applications unless you know how to attack them

•  The problem •  For many developers

‘penetration testing’ is a black art

•  The solution •  Teach basic pentesting techniques to developers

The Caveat

This is in addition to: • 

Teaching secure coding techniques

• 

Teaching about common vulnerabilities (e.g. OWASP top 10)

• 

Secure Development Software Lifecycle

• 

Static source code analysis

• 

Code reviews

• 

Professional pentesting

• 



The Zed Attack Proxy •  Released September 2010 •  Ease of use a priority •  Comprehensive help pages •  Free, Open source •  Cross platform •  A fork of the well regarded Paros Proxy •  Involvement actively encouraged •  Adopted by OWASP October 2010

9 months later… •  Version 1.2.0 downloaded > 6300 times •  Version 1.3.0 just released •  5 main coders, 15 contributors •  Fully internationalized •  Translated into 9 languages:

Brazilian Portuguese, Chinese, French, German, Greek, Indonesian, Japanese, Polish, Spanish

•  Mostly used by Professional Pentesters?

ZAP Principles

•  Free, Open source •  Cross platform •  Easy to use •  Easy to install •  Internationalized •  Fully documented

•  Involvement actively encouraged

•  Reuse well regarded components

Where is ZAP being used? United States Japan Spain United Kingdom Germany China Ukraine Switzerland Mexico Canada

The Main Features

l the essentials for web application testing Intercepting Proxy Active and Passive Scanners Spider Report Generation Brute Force (using OWASP DirBuster code) Fuzzing (using OWASP JBroFuzz code)

The Additional Features •  Auto tagging •  Port scanner •  Smart card support •  Session comparison •  Invoke external apps •  BeanShell integration •  API + Headless mode •  Dynamic SSL Certificates •  Anti CSRF token handling

The Demo

The Future

•  Enhance scanners to detect more vulnerabilities

•  Extend API, better integration

•  Fuzzing analysis

•  Easier to use, better help

•  More localization

(all offers gratefully received!)

•  Parameter analysis?

•  Technology detection?

•  What do you want?? 

Summary and Conclusion 1 •  ZAP is: •  Easy to use (for a web app pentest tool;) •  Ideal for appsec newcomers •  Ideal for training courses •  Being used by Professional Pen Testers •  Easy to contribute to (and please do!) •  Improving rapidly

Summary and Conclusion 2 •  ZAP has: •  An active development community •  An international user base •  The potential to reach people new to OWASP and appsec, especially developers and functional testers

•  ZAP is a key OWASP project

Any Questions?

http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

Simon Bennetts - OWASP Zed Attack Proxy.pdf

Page 2 of 14. The Introduction. • The statement. • You cannot build secure. web applications unless you. know how to attack them. • The problem. • For many ...

3MB Sizes 2 Downloads 163 Views

Recommend Documents

Simon Bennetts - OWASP AppSec Research (AppSecEU) 2015
ZAP (desktop) properties. 13. Database. Data Structures. Processes. Deployment. Users. Roles. Access. Application Lifetime. Licence. Local HSQLDB. Db and ...

Simon Bennetts - OWASP AppSec Research (AppSecEU) 2015
ZAP (desktop) properties. 13. Database. Data Structures. Processes. Deployment. Users. Roles. Access. Application Lifetime. Licence. Local HSQLDB. Db and ...

NET Reverse Engineering - owasp
Exploiting ANY server / application vulnerability to execute commands. • Example application has a vulnerability that let us to access the file system.

alm-alfrash-alhdeth-zed-ar_PTIFF.pdf
Page 3 of 212. Page 3 of 212. alm-alfrash-alhdeth-zed-ar_PTIFF.pdf. alm-alfrash-alhdeth-zed-ar_PTIFF.pdf. Open. Extract. Open with. Sign In. Main menu.

ZED 420, 428, 436.pdf
Units returned should be packed to avoid transit damage. In certain territories the terms may vary. Check with your ALLEN &. HEATH agent for any additional ...

OWASP Testing Guide v4.pdf
A Typical SDLC Testing Workflow. 22 - 24. 3. Web Application Security Testing. Introduction and Objectives. Testing Checklist. Information Gathering. Conduct ...

Unicode Smuggling or SQL Smuggling - owasp
>E.g. 9 digits for Id. >Email address. >Etc. ▫Can use Regular Expressions .... >Automatic translation. ▫Translation occurs if similar character exists. OWASP. 26.

owasp zap tutorial pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. owasp zap ...

owasp code review guide pdf
Download now. Click here if your download doesn't start automatically. Page 1 of 1. owasp code review guide pdf. owasp code review guide pdf. Open. Extract.

owasp code review guide pdf
owasp code review guide pdf. owasp code review guide pdf. Open. Extract. Open with. Sign In. Main menu. There was a problem previewing this document.

NET 3.5 - Pollution Attack: A New Attack Against ...
may be obtained from 1-hop beacons by receiving the location of beacon and measuring the distance between them (e.g., through measuring received signal strength indicator (RSSI). [14] or time difference of arrival (TDoA) [15]), also may be obtained f

Amazing Adwords Attack-www.InstantStressManagement.com.pdf ...
Amazing Adwords Attack-www.InstantStressManagement.com.pdf. Amazing Adwords Attack-www.InstantStressManagement.com.pdf. Open. Extract. Open with.

Simon Critchley
Jun 20, 2006 - also invokes notions of “the democratic revolution” and “radical ..... 35 Although it has received too little attention from his readers, and although ...

Fred Reinfeld Attack And counter attack in chess.Pdf
desarrollando diferentes proyectos e ideas. Tenemos miembros .... Pdf. Fred Reinfeld Attack And counter attack in chess.Pdf. Open. Extract. Open with. Sign In.

Nuclear Attack
... Nuclear Attack Be Launched. Page 2 of 2. 1499609635163atomicattackmedicinalguidingprinciplec ... tenceoutlinesympathizewithtothepublicrobustness.pdf.

Operation Attack News - Apr2016
1310 22nd Avenue South St. Petersburg, FL 33705 (727) 822-1187 ... Sanderlin IB World School for “Soxtober,” a school-wide sock drive that collected 900.

attack titan 480p.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. attack titan ...

simon-series-51a.pdf
Page 3 of 3. Page 3 of 3. simon-series-51a.pdf. simon-series-51a.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying simon-series-51a.pdf. Page 1 of ...

zef-zed-economical-digital-tension-meter-data-sheet.pdf ...
zef-zed-economical-digital-tension-meter-data-sheet.pdf. zef-zed-economical-digital-tension-meter-data-sheet.pdf. Open. Extract. Open with. Sign In. Main menu.

DDos attack protection.pdf
Recent attacks like those targeting Spamhaus, Sony and Github. indicate DDoS attacks are getting larger, more sophisticated, and more. destructive. • 3 out of ...