Zed Attack Proxy - An easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
OWASP Zed Attack Proxy Project
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing.
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
Current Release -
ZAP 1.4.0 - 08/04/2012 - (download)
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
Some of ZAP's features:
Current Release -
ZAP 1.4.0 - 08/04/2012 - (download)
Release description: This release includes the following significant changes:
ZAP is ideal for Security Regression Tests - see this video on Youtube
- Plugable extensions: Full extensions can now be plugged into ZAP dynamically with full access to all of ZAPs features.
- Syntax highlighting in the Response Panel: The HTML panels now support switchable syntax highlighting.
- fuzzdb integration: The fuzzer now includes fuzzdb (http://code.google.com/p/fuzzdb/) fuzzing files.
- Parameter analysis: A new Params tab shows a summary of all of the parameters a site has used.
- Enhanced XSS scanner: The Cross Site Scripting active scanner has been rewritten from scratch to find more potential XSS issues and report fewer false positives.
- Watcher passive checks ported to ZAP: Different checks have been ported from Watcher to ZAP (thanks to Chris Weber for permission).
- Tons of bug-fixes and minor improvements.
ZAP is ideal for Security Regression Tests - see this video on Youtube
Visit Website -
For more information -
Installation -
- Download Zed Attack Proxy (ZAP), and install
- Run Zed Attack Proxy (ZAP)
- Go to Tools -> Options -> Connections, and set proxy settings to match your browser proxy settings (and proxy exclusions)
- Go to Tools -> Options -> Local proxy and enter localhost (port: 85),
- In your browser of choice, set proxy in LAN settings to localhost (port: 85), and clear the proxy exclusions list.
- Access a test site URL to verify settings all applied correctly (The Zed Attack Proxy “Sites” window should populate with all URL’s visited)
- If the site requires Authentication, go to Tools -> Options -> Authentication, and add details in the table.
- Run Active Scan on root URL (Click Active Scan tab, and select URL from dropdown if not already selected).
- Click Report -> Generate HTML report, to view issues found.
- Run Spider test, which will pick up on 404 errors, missing URL references, and help you identify redundant file calls.