Difference between revisions of "OWASP Zed Attack Proxy Project"

From OWASP
Jump to: navigation, search
 
(63 intermediate revisions by 6 users not shown)
Line 1: Line 1:
 
{{Social Media Links}}
 
{{Social Media Links}}
 
= Main =
 
= Main =
[[Image:zap128x128.png|right]]
+
[[Image:Toolswatch2013.png|link=http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ | right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
{{ReviewProject|projectname=zaproxy|language=en}}
 +
<div style="font-size:120%;border:none;margin: 0;color:#000">
 
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
 
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
  
Line 9: Line 10:
 
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
 
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
  
''' Want to understand the philosophy behind ZAP? Read this blog post: [https://blog.mozilla.org/security/2012/09/13/owasp-zap-the-firefox-of-web-security-tools/ OWASP ZAP: the Firefox of web security tools] '''
+
'''ZAP 2.3.1 is now available! Download it here:'''
  
[[Image:ZAP-Download.png | link=http://code.google.com/p/zaproxy/downloads/list]]
+
[[Image:ZAP-Download.png | link=http://code.google.com/p/zaproxy/wiki/Downloads?tm=2]]
The current version of ZAP is [http://code.google.com/p/zaproxy/wiki/HelpReleases1_4_1 1.4.1].
+
  
ZAP is ideal for [http://code.google.com/p/zaproxy/wiki/SecRegTests Security Regression Tests] - see this video on Youtube
+
ZAP is taking part in the '''Google Summer of Code 2014'''. See the [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_ZAP_-_Advanced_access_control_testing OWASP wiki] for suggested projects. And if you have any questions about this please ask them on the [http://groups.google.com/group/zaproxy-develop ZAP dev group]
 +
 
 +
''' ZAP Is the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top Security Tool of 2013 as voted by ToolsWatch.org readers]! '''
 +
 
 +
For a quick overview of ZAP and to see some of the more advanced ZAP features see these tutorial videos on YouTube:
 +
 
 +
{|
 +
|-
 +
{{#ev:youtube|eH0RBI0nmww}}&nbsp;
 +
{{#ev:youtube|Ofmp-haNI7s}}
 +
|}
  
{{#ev:youtube|ZWSLFHpg1So}}
 
  
 
For more videos see the links on the [https://code.google.com/p/zaproxy/wiki/Videos wiki videos page].
 
For more videos see the links on the [https://code.google.com/p/zaproxy/wiki/Videos wiki videos page].
  
Want a very quick introduction? See the [http://www.owasp.org/images/e/e3/OWASP_ZAP_Flyer.pdf project pamphlet].
+
Interested in a ZAP talk or training event? See the [https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project#tab=Talks talks] tab. Not one near you? Contact a [http://code.google.com/p/zaproxy/wiki/ZapEvangelists Zap Evangelist] to arrange one!
 +
 
 +
Want a very quick introduction? See the [https://www.owasp.org/index.php/File:owasp_zap_flyer_v2.pdf project pamphlet].
  
 
For a slightly longer introduction see the [http://www.owasp.org/images/c/c8/Conference_Style_slides_for_ZAP.ppt project presentation].
 
For a slightly longer introduction see the [http://www.owasp.org/images/c/c8/Conference_Style_slides_for_ZAP.ppt project presentation].
  
 
For more details about ZAP, including the full user guide, see the [https://code.google.com/p/zaproxy/wiki/Introduction wiki].
 
For more details about ZAP, including the full user guide, see the [https://code.google.com/p/zaproxy/wiki/Introduction wiki].
 +
 +
We recently asked our users for feedback about ZAP, you can see their responses (which are separate for each languages) here: [https://docs.google.com/forms/d/1lUPTYHe9CS5tropNStoRK9jVeZ7tWRywhBHDIZjE4cA/viewanalytics English], [https://docs.google.com/forms/d/1JhUdp4cxZ3qRayYWz3JHOLSP7DPdBI-zgnFzDWxbX5A/viewanalytics French], [https://docs.google.com/forms/d/1xAKE3TCOaBrmFnyAVUr6NdTd3mKvu7g_uGriOcS2Ka4/viewanalytics Spanish], [https://docs.google.com/forms/d/1qN3MlRcjQk9riIkdpfnJLkFd4cW5ALp136da08xvMaA/viewanalytics Arabic]
  
 
<paypal>Zed Attack Proxy</paypal>
 
<paypal>Zed Attack Proxy</paypal>
Line 44: Line 57:
 
|}
 
|}
  
 +
= Talks =
 +
[[Image:zap128x128.png|right]]
 +
<div style="font-size:120%;border:none;margin: 0;color:#000">
 +
{{:Projects/OWASP Zed Attack Proxy Project/Pages/Talks | Talks}}
 +
 +
 +
</div>
 
= News =
 
= News =
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
'''Latest News:'''
+
{{:Projects/OWASP Zed Attack Proxy Project/Pages/News | News}}
  
* 2012/08/05 Version [http://code.google.com/p/zaproxy/wiki/HelpReleases1_4_1 1.4.1] released
+
</div>
* 2012/07/08 Version [http://code.google.com/p/zaproxy/wiki/HelpReleases1_4_0 1.4.0.1] downloaded over 15,000 times
+
= ZAP Gear =
* 2012/07/05 [http://code.google.com/p/zaproxy/wiki/ApiPython Python API] released
+
[[Image:zap128x128.png|right]]
* 2012/06/15 ZAP accepted for the [[Projects_Reboot_2012|OWASP Project Reboot]]
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
* 2012/06/13 Using ZAP for Security Regression tests [http://www.youtube.com/watch?v=ZWSLFHpg1So video] published
+
 
* 2012/06/04 Version [http://code.google.com/p/zaproxy/wiki/HelpReleases1_4_0 1.4.0.1] downloaded over 10,000 times
+
Yes, you can now buy ZAP related gear!
* 2012/05/28 Simon's Introduction to ZAP talk at App Sec USA becomes the most watched OWASP video on [http://vimeo.com/owasp/videos/sort:plays vimeo]
+
 
* 2012/04/23 3 ZAP related [http://code.google.com/p/zaproxy/wiki/GSoC2012 Google Summer of Code 2012] projects accepted. To find out how these are progressing please see their [http://code.google.com/p/zaproxy/wiki/GSoC2012 wiki pages].
+
Its your chance to show your support for the project, c/o `CafePress`.
* 2012/04/23 OWASP ZAP [http://code.google.com/p/zaproxy/wiki/SmartCards SmartCard Project] officially launched.
+
 
* 2012/04/08 Version [http://code.google.com/p/zaproxy/wiki/HelpReleases1_4_0 1.4.0.1] released
+
Click on the tshirt to enter the [http://www.cafepress.com/zaproxy ZAP Gear Store]:
* 2012/02/10 Version [http://code.google.com/p/zaproxy/wiki/HelpReleases1_3_4 1.3.4] downloaded over 10,000 times
+
 
* 2012/02/01 OWASP ZAP is named the [http://holisticinfosec.blogspot.com/2012/02/2011-toolsmith-tool-of-year-owasp-zap.html Toolsmith Tool of the Year for 2011!]
+
[[Image:zap-tshirt-cp.PNG | link=http://www.cafepress.com/zaproxy]]
  
 
</div>
 
</div>
 
= Sponsors =
 
= Sponsors =
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
  
 
ZAP is developed by a worldwide [http://code.google.com/p/zaproxy/people/list team] of volunteers.
 
ZAP is developed by a worldwide [http://code.google.com/p/zaproxy/people/list team] of volunteers.
  
But we have also been helped by many organizations, either either financially or by encouraging their employees to work on ZAP:
+
But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:
  
 
* [http://www.owasp.org OWASP]
 
* [http://www.owasp.org OWASP]
Line 77: Line 97:
 
* [http://www.microsoft.com Microsoft]
 
* [http://www.microsoft.com Microsoft]
 
* [http://www.hacktics.com/ Hacktics, Ernst & Young]
 
* [http://www.hacktics.com/ Hacktics, Ernst & Young]
* [http://www.taddong.com/ Taddong]
+
* [http://www.dinosec.com/ DinoSec]
 
* [http://www.denimgroup.com Denim Group]
 
* [http://www.denimgroup.com Denim Group]
 +
* [http://www.aspectsecurity.com/ Aspect Security]
 
* [http://secureideas.net SecureIdeas]
 
* [http://secureideas.net SecureIdeas]
 
* [http://utilisec.com UtiliSec]
 
* [http://utilisec.com UtiliSec]
 
* [http://www.encription.co.uk/ encription]
 
* [http://www.encription.co.uk/ encription]
 
</div>
 
</div>
= Features =
+
= Functionality =
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
'''Some of ZAP's features:'''
+
'''Some of ZAP's functionality:'''
  
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsIntercept Intercepting Proxy]
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsIntercept Intercepting Proxy]
 +
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsSpider Traditional] and AJAX spiders
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsAscan Automated scanner]
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsAscan Automated scanner]
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsPscan Passive scanner]
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsPscan Passive scanner]
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsBruteforce Brute Force scanner]
+
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsBruteforce Forced browsing]
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsSpider Spider]
+
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsFuzz Fuzzer]
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsFuzz Fuzzer]
* [http://code.google.com/p/zaproxy/wiki/SmartCards Smartcard and Client Digital Certificates support]
 
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsPortscan Port scanner]
 
 
* [http://code.google.com/p/zaproxy/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]
 
* [http://code.google.com/p/zaproxy/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsApi API]
+
* [http://code.google.com/p/zaproxy/wiki/SmartCards Smartcard and Client Digital Certificates support]
* [http://code.google.com/p/zaproxy/wiki/HelpUiDialogsBeanshell Beanshell integration]
+
* [http://code.google.com/p/zaproxy/wiki/HelpAddonsWebsocketIntroduction Web sockets] support
 +
* [http://code.google.com/p/zaproxy/wiki/HelpAddonsScriptsScripts Support for a wide range of scripting languages]
 +
* [http://code.google.com/p/zaproxy/wiki/HelpAddonsPlugnhackPlugnhack Plug-n-Hack support]
 +
* Authentication and session support
 +
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsApi Powerful REST based API]
 +
* Automatic updating option
 +
* [https://code.google.com/p/zap-extensions/ Integrated and growing marketplace of add-ons]
  
 
</div>
 
</div>
= Characteristics =
+
= Features =
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
'''Some of ZAP's characteristics:'''
+
'''Some of ZAP's features:'''
  
* Easy to install (just requires java 1.6)
+
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]
 +
* Cross platform
 +
* Easy to install (just requires java 1.7)
 +
* Completely free (no paid for 'Pro' version)
 
* Ease of use a priority
 
* Ease of use a priority
 
* [http://code.google.com/p/zaproxy/wiki/HelpIntro Comprehensive help pages]
 
* [http://code.google.com/p/zaproxy/wiki/HelpIntro Comprehensive help pages]
 
* Fully internationalized
 
* Fully internationalized
* Under active development
+
* Translated into over 20 languages
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]
+
* Community based, with involvement actively encouraged
* Free (no paid for 'Pro' version)
+
* Under active development by an international team of volunteers
* Cross platform
+
* Involvement actively encouraged
+
  
 
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].
 
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].
Line 121: Line 147:
 
= Languages =
 
= Languages =
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
  
 
'''ZAP supports the following languages:'''
 
'''ZAP supports the following languages:'''
  
 
* English
 
* English
 +
* Arabic
 +
* Bosnian
 
* Brazilian Portuguese
 
* Brazilian Portuguese
 
* Chinese
 
* Chinese
 
* Danish
 
* Danish
 +
* Filipino
 
* French
 
* French
 
* German
 
* German
 
* Greek
 
* Greek
 
* Indonesian
 
* Indonesian
 +
* Italian
 
* Japanese
 
* Japanese
 +
* Korean
 
* Persian
 
* Persian
 
* Polish
 
* Polish
* Spanish  
+
* Russian
 +
* Sinhala
 +
* Spanish
 +
* Urdu
  
Can you help improve these translations or add new ones? Please [http://groups.google.com/group/zaproxy-develop zaproxy-develop get in touch!]
+
You can use [http://crowdin.net/project/owasp-zap Crowdin] to help improve these translations or add new ones right now!
  
 
</div>
 
</div>
 
= Roadmap =
 
= Roadmap =
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
  
==Release 2.0.0==
+
==Release 2.3.0==
The next release of ZAP will be a major release and include significant enhancements.
+
ZAP 2.3.0 has been released, which includes:
 
+
* A ZAP 'lite' version in addition to the existing 'full' version
It will definitely include:
+
* View, intercept, manipulate, resend and fuzz client-side (browser) events
* A replacement for the 'standard' spider, c/o [http://code.google.com/p/zaproxy/wiki/GSoC2012 Google Summer of Code 2012]
+
* Enhanced authentication support
* A new 'Ajax' spider, c/o [http://crawljax.com/ Crawljax] and [http://code.google.com/p/zaproxy/wiki/GSoC2012 Google Summer of Code 2012]
+
* Support for non standard apps
* Session awareness, c/o [http://code.google.com/p/zaproxy/wiki/GSoC2012 Google Summer of Code 2012]
+
* Input Vector scripts
* Web Socket support, c/o [http://code.google.com/p/zaproxy/wiki/GSoC2012 Google Summer of Code 2012]
+
* Scan policy - fine grained control
* Session scope
+
* Advanced Scan dialog
* Different modes (Safe, Protected and Standard)
+
* Extended command line options
* A scripting console (with support for any language that conforms to [http://www.jcp.org/en/jsr/detail?id=223 JSR 223])
+
* Enhancements and fixes logged on the [https://code.google.com/p/zaproxy/issues/list issues page]
+
And we are also hoping to include:
+
* An integrated extensions marketplace
+
* Authentication handling
+
 
* More API support
 
* More API support
* Fine grained scanning controls
+
* Internationalized help file
* Possibly even more enhancements, details TBA
+
* Keyboard shortcuts
Note that we dont have a release date for this yet, but the current 'finger in the air' plan is for sometime in autumn 2012.
+
* New UI options
 +
* More functionality moved to add-ons
 +
* New and improved active and passive scanning rules
 +
 
 +
For more details see http://code.google.com/p/zaproxy/wiki/HelpReleases2_3_0
 +
 
 +
==Release 2.4.0==
 +
 
 +
The major features we are currently working on include:
 +
* Client side scanning
 +
* Advanced fuzzing
 +
* Advanced access control testing
 +
* SOAP service scanning
 +
* Sequence scanning
 +
* Sequence detection
  
Details of previous releases can be found [http://code.google.com/p/zaproxy/wiki/HelpReleasesReleases here]
+
The date and exact features that will be included in 2.4 have not been finalized.
  
 
</div>
 
</div>
 
= Get Involved =
 
= Get Involved =
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
<div style="font-size:142%;border:none;margin: 0;color:#000">
+
<div style="font-size:120%;border:none;margin: 0;color:#000">
  
 
Involvement in the development of ZAP is actively encouraged!
 
Involvement in the development of ZAP is actively encouraged!
Line 186: Line 229:
 
==Feedback==
 
==Feedback==
  
Please use the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group] for feedback:
+
Please use the [http://groups.google.com/group/zaproxy-users zaproxy-users Google Group] for feedback:
 
* What do like?
 
* What do like?
 
* What don't you like?
 
* What don't you like?
Line 202: Line 245:
 
Are you fluent in another language? Can you help translate ZAP into that language?
 
Are you fluent in another language? Can you help translate ZAP into that language?
  
If so then please get in touch.
+
You can use [http://crowdin.net/project/owasp-zap Crowdin] to do that!
  
 
==Development==
 
==Development==
Line 212: Line 255:
 
If you actively contribute to ZAP then you will be invited to join the project.  
 
If you actively contribute to ZAP then you will be invited to join the project.  
  
 
<!---- = Project About =
 
{{:GPC_Project_Details/OWASP_ZAP | OWASP Project Identification Tab}} --->
 
 
</div>
 
</div>
 
= Project About =
 
= Project About =
 +
<div style="font-size:120%;border:none;margin: 0;color:#000">
 
[[Image:zap128x128.png|right]]
 
[[Image:zap128x128.png|right]]
 
{{:Projects/OWASP Zed Attack Proxy Project | Project About}}
 
{{:Projects/OWASP Zed Attack Proxy Project | Project About}}
Line 223: Line 264:
 
__NOTOC__ <headertabs />
 
__NOTOC__ <headertabs />
  
[[Category:OWASP_Project|Zed Attack Proxy Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]
+
[[Category:OWASP_Project|Zed Attack Proxy Project]]
 +
[[Category:OWASP_Tool]]
 +
[[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]]
 +
[[Category:OWASP_Download]]
 +
[[Category:Popular]]

Latest revision as of 06:13, 9 July 2014


[edit]

Toolswatch2013.png

Review this project.

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

ZAP 2.3.1 is now available! Download it here:

ZAP-Download.png

ZAP is taking part in the Google Summer of Code 2014. See the OWASP wiki for suggested projects. And if you have any questions about this please ask them on the ZAP dev group

ZAP Is the Top Security Tool of 2013 as voted by ToolsWatch.org readers!

For a quick overview of ZAP and to see some of the more advanced ZAP features see these tutorial videos on YouTube:

 


For more videos see the links on the wiki videos page.

Interested in a ZAP talk or training event? See the talks tab. Not one near you? Contact a Zap Evangelist to arrange one!

Want a very quick introduction? See the project pamphlet.

For a slightly longer introduction see the project presentation.

For more details about ZAP, including the full user guide, see the wiki.

We recently asked our users for feedback about ZAP, you can see their responses (which are separate for each languages) here: English, French, Spanish, Arabic

funds to OWASP earmarked for Zed Attack Proxy.

Zap128x128.png

ZAP Add Alert Screen Shot

ZAP Help Screen Shot
ZAP History Filter Screen Shot
ZAP Search Tab Screen Shot

Zap128x128.png

Upcoming Talks/Training:


2014 July 10: OWASP Columbus Code Jam, One Easton Ova, Suite 175, Columbus, OH: Bill Sempf: OWASP Code Jam

Get together and code!

This month we'll work on Zest scripting in Zed Attack Proxy.

And a little Violent Python.


2014 August 6: Black Hat Arsenal, Las Vegas, NV: Simon Bennetts: OWASP ZAP

The Zed Attack Proxy (ZAP) is currently the most active open source web application security tool and competes effectively with commercial tools.

While it is an ideal tool for people new to appsec, it also has many features specifically intended for advanced penetration testing.

Simon will give a quick introduction to ZAP and then dive into the more advanced features as well as giving an overview of where its heading.


2014 September 28 - October 2: JavaOne, San Fransisco, CA: Simon Bennetts: Security Testing for Developers Using OWASP ZAP

Any application exposed to the internet will be attacked, and the earlier in the development cycle you find vulnerabilities, the better.

This session introduces the OWASP Zed Attack Proxy (ZAP), a free, open source, Java-based integrated penetration testing tool for finding vulnerabilities in web applications.

Although ZAP is widely used by security professionals, it is also ideal for anyone new to web application security and includes features specifically aimed at developers.

The session shows how ZAP can be used to find vulnerabilities, both manually and as part of an automated build. It also provides an overview of some of the more advanced features and explains how they can be used for more-complex security testing.


Zap128x128.png

Latest News:

Zap128x128.png

Yes, you can now buy ZAP related gear!

Its your chance to show your support for the project, c/o `CafePress`.

Click on the tshirt to enter the ZAP Gear Store:

Zap-tshirt-cp.PNG

Zap128x128.png

ZAP is developed by a worldwide team of volunteers.

But we have also been helped by many organizations, either financially or by encouraging their employees to work on ZAP:

Zap128x128.png

Some of ZAP's features:

  • Open source
  • Cross platform
  • Easy to install (just requires java 1.7)
  • Completely free (no paid for 'Pro' version)
  • Ease of use a priority
  • Comprehensive help pages
  • Fully internationalized
  • Translated into over 20 languages
  • Community based, with involvement actively encouraged
  • Under active development by an international team of volunteers

ZAP is a fork of the well regarded Paros Proxy.

Zap128x128.png

ZAP supports the following languages:

  • English
  • Arabic
  • Bosnian
  • Brazilian Portuguese
  • Chinese
  • Danish
  • Filipino
  • French
  • German
  • Greek
  • Indonesian
  • Italian
  • Japanese
  • Korean
  • Persian
  • Polish
  • Russian
  • Sinhala
  • Spanish
  • Urdu

You can use Crowdin to help improve these translations or add new ones right now!

Zap128x128.png

Release 2.3.0

ZAP 2.3.0 has been released, which includes:

  • A ZAP 'lite' version in addition to the existing 'full' version
  • View, intercept, manipulate, resend and fuzz client-side (browser) events
  • Enhanced authentication support
  • Support for non standard apps
  • Input Vector scripts
  • Scan policy - fine grained control
  • Advanced Scan dialog
  • Extended command line options
  • More API support
  • Internationalized help file
  • Keyboard shortcuts
  • New UI options
  • More functionality moved to add-ons
  • New and improved active and passive scanning rules

For more details see http://code.google.com/p/zaproxy/wiki/HelpReleases2_3_0

Release 2.4.0

The major features we are currently working on include:

  • Client side scanning
  • Advanced fuzzing
  • Advanced access control testing
  • SOAP service scanning
  • Sequence scanning
  • Sequence detection

The date and exact features that will be included in 2.4 have not been finalized.

Zap128x128.png

Involvement in the development of ZAP is actively encouraged!

You do not have to be a security expert in order to contribute.

Some of the ways you can help:

Feature Requests

Please raise new feature requests as enhancement requests here: http://code.google.com/p/zaproxy/issues/list

If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly.

Feedback

Please use the zaproxy-users Google Group for feedback:

  • What do like?
  • What don't you like?
  • What features could be made easier to use?
  • How could the help pages be improved?

Log issues

Have you had a problem using ZAP?

If so and its not already been logged then please report it

Localization

Are you fluent in another language? Can you help translate ZAP into that language?

You can use Crowdin to do that!

Development

If you fancy having a go at adding functionality to ZAP then please get in touch via the zaproxy-develop Google Group.

Again, you do not have to be a security expert to contribute code - working on ZAP could be great way to learn more about web application security!

If you actively contribute to ZAP then you will be invited to join the project.

Zap128x128.png
PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP Zed Attack Proxy Project (home page)
Purpose: This project, OWASP Zed Attack Proxy Project (ZAP), provides an easy to use integrated penetration testing tool for testing web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

License: Apache License 2.0
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: View
Project Presentation: View
Mailing list: Mailing List Archives
Project Roadmap: View
Main links:
Key Contacts
  • Contact Psiinon @ to contribute to this project
  • Contact Psiinon @ to review or sponsor this project
  • Contact the GPC to report a problem or concern about this project or to update information.
current release
ZAP 2.3.1 - 21/05/2014 - (download)
Release description: This is a bug fix release

For more details see http://code.google.com/p/zaproxy/wiki/HelpReleases2_3_1

Rating: Projects/OWASP Zed Attack Proxy Project/GPC/Assessment/ZAP 2.3.1
last reviewed release
ZAP 1.3.0 - 06/06/2011 - (download)
Release description: This release includes the following significant changes:
  • Fuzzing: Strings in a response can now be fuzzed to try to find vulnerabilities. Anti CRSF tokens can be detected and automatically regenerated when fuzzing. This functionality is based on code from the OWASP JBroFuzz project.
  • Dynamic SSL certificates: The support for SSL connections was improved and simplified. User's can now create their own root certificate and distribute this into their HTTP clients.
  • Daemon mode: Starting ZAP with the "-daemon" command line option will cause it to run in the background in 'headless' mode, meaning that no UI is displayed.
  • API: An initial API has been implemented in XML, JSON and HTML.
  • Beanshell integration: The BeanShell is an interactive Java shell that can be used to execute BeanShell scripts. BeanShell integration in OWASP ZAP enables you to write scripts using the ZAP functions and data set.
  • Full internationalisation: All displayed strings are now fully internationalised.
  • Localisation: Out of the box support for the following languages: English, Brazilian Portuguese, Chinese, French, German, Greek, Indonesian, Japanese, Polish, Spanish
Rating: Greenlight.pngGreenlight.pngGreenlight.png Stable Release - Assessment Details


other releases