15
How to use proxy in security testing OWASP Zed Attack Proxy (ZAP)

How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

  • Upload
    others

  • View
    26

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

How to use proxy in security testing

OWASP Zed Attack Proxy (ZAP)

Page 2: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

What is Proxy (Server)

Page 3: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

What is HTTP Proxy Server

Page 4: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

What is Security Testing (and why it is important)

Page 5: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

Our lab for today1. Raspberry Pi (as IoT

device with sensors) is sending data to remote (cloud)

server

2. Remote server have web dashboard for accessing sensors

data and configuration

3. Using OWASP ZAP we will access and test this

web dashboard

Page 6: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

What is OWASP

Page 7: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

What is OWASP Top Ten

Page 8: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

What is OWASP Zed Attack Proxy (ZAP)

• Web application penetration testing tool

• Free and open source

• An OWASP flagship project

• Ideal for beginners but also used by professionals

• Interesting for developers and automated security testing

Page 9: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

ZAP Principles• Free, open source

• Cross platform

• Easy to use and easy to install

• Internationalized

• Fully documented

• Work well with other tools

• Reuse well regarded components

• Involvement is actively encouraged

Page 10: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

ZAP main features• Intercepting proxy

• Active and passive scanners

• Spider

• Report generation

• Brute-forcing

• Fuzzing

• Extensibility

Page 11: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

ZAP additional features• Auto Tagging

• Port scanner

• Parameter analysis

• Smart card support

• Session comparison

• Invoke external applications and tools

• API + headless mode

• Dynamic SSL certificates

Page 12: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

Hand’s on time

• Install ZAP

• Configure ZAP

• Configure Mozilla Firefox to use ZAP as proxy server

• Learn ZAP interface

• Explore vulnerable web application via ZAP

Page 13: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

Capture The Flag using ZAP

Page 14: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

Questions

Page 15: How to use proxy in security testingWhat is OWASP Zed Attack Proxy (ZAP) • Web application penetration testing tool • Free and open source • An OWASP flagship project • Ideal

Thank you for your time!

You can contact me via e-mail:

[email protected]

“If you think you are too small to make a difference, try sleeping with a mosquito.” - Dalai Lama XIV