AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
K9 web protection administration panel8/13/2023 Here is how the home page should look like. I set Firefox with ZAP proxy:Īfter completing the step above, you are done with the installation process and are ready to kick off a scan. The ZAP team has a nice guide here on how to do this for the most common browsers. The last step in the installation process is similar to BURP and that is to configure your browser to use ZAP as a proxy. You may be prompted to generate an SSL certificate - which you will need in order to test secure applications - however, I skipped that initially since you can always come back to it. ![]() Soon after that, the application will auto-start. Also, ZAP comes included in several security distributions - a list can be found here.Īfter you have extracted the ZAP_2.3.1_, you just need to run the zap.sh: Note that Java version 7 is required for both Windows and Linux. I downloaded ZAP on my Ubuntu 13 Desktop instance. ZAP can run on Windows, Linux, and OS/X, and it can be downloaded from here. Also, since there is already so much professional documentation available for this project, this post will not pay too much attention to its features and functionality, but rather on my experience with the tool and how I got it up and running. ![]() The project is extremely well documented with a user guide, FAQs, tutorials, etc., all conveniently located on its wiki. ![]() ZAP was selected as the second top security tool of 2014 by. I have known about ZAP for a while but I just thought I do a quick write up. The goal of this post is to provide an overview of an awesome OWASP project which is designed to find vulnerabilities in web applications called: Zed Attack Proxy (ZAP).
0 Comments
Read More
Leave a Reply. |