Difference between revisions of "OWASP Zed Attack Proxy Project"

From OWASP
Jump to: navigation, search
Line 45: Line 45:
 
* French
 
* French
 
* German
 
* German
 +
* Greek
 
* Japanese
 
* Japanese
 
* Polish
 
* Polish

Revision as of 09:43, 8 March 2011

Main

ZAP Add Alert Screen Shot
ZAP Help Screen Shot
ZAP History Filter Screen Shot
ZAP Search Tab Screen Shot

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

Please take our Online Survey to let us know what you would like the developers to focus on.

ZAP-Download.png

The current version of ZAP is 1.2.0.

Some of ZAP's features:

Some of ZAP's characteristics:

  • Easy to install (just requires java 1.6)
  • Ease of use a priority
  • Comprehensive help pages
  • Under active development
  • Open source
  • Free (no paid for 'Pro' version)
  • Cross platform
  • Involvement actively encouraged

It supports the following languages:

  • English
  • Brazilian Portuguese
  • Chinese
  • French
  • German
  • Greek
  • Japanese
  • Polish
  • Spanish

ZAP is a fork of the well regarded Paros Proxy.

Roadmap

Details of previous releases can be found here

Release 1.3.0

The developments planned for this release include:

  • BeanShell integration
  • Fuzzing (using components from JBroFuzz)
  • APIs to allow other tools to interact with ZAP
  • Full internationalization

Future Releases

Future releases are likely to include:

  • Further improvements to the passive and active automated scanners
  • Further improvements the Spider

Get Involved

Involvement in the development of ZAP is actively encouraged!

You do not have to be a security expert in order to contribute.

Some of the ways you can help:

Feature Requests

Please raise new feature requests as enhancement requests here: http://code.google.com/p/zaproxy/issues/list

If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly.

Feedback

Please use the zaproxy-develop Google Group for feadback:

  • What do like?
  • What dont you like?
  • What features could be made easier to use?
  • How could the help pages be improved?

Log issues

Have you had a problem using ZAP?

If so and its not already been logged then please report it

Localization

Are you fluent in another language? Can you help translate ZAP into that language?

If so then please get in touch.

Development

If you fancy having a go at adding functionality to ZAP then please get in touch via the zaproxy-develop Google Group.

Again, you do not have to be a security expect to contribute code - working on ZAP could be great way to learn more about web application security!

If you actively contribute to ZAP then you will be invited to join the project.


Project About

{{Template:{{{1}}}

| project_name = OWASP Zed Attack Proxy Project

| project_home_page = OWASP_Zed_Attack_Proxy_Project

| project_description = This project, OWASP Zed Attack Proxy Project (ZAP), provides an easy to use integrated penetration testing tool for testing web applications.

It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing.

ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.

| project_license = Apache License 2.0

| leader_name1 = Psiinon | leader_email1 = psiinon@gmail.com | leader_username1 = Psiinon

| contributor_name[1-10] = | contributor_email[1-10] = | contributor_username[1-10] =

| pamphlet_link = https://www.owasp.org/index.php/File:owasp_zap_flyer_v2.pdf

| presentation_link = http://www.owasp.org/images/c/c8/Conference_Style_slides_for_ZAP.ppt

| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-zed-attack-proxy

| project_road_map = http://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project/Roadmap

| links_url1 = http://code.google.com/p/zaproxy/ | links_name1 = ZAP's Google Code page

| links_url2 = http://code.google.com/p/zaproxy/wiki/Downloads?tm=2 | links_name2 = Downloads

| links_url3 = http://code.google.com/p/zaproxy/issues/list | links_name3 = Issues

| links_url4 = http://code.google.com/p/zaproxy/wiki/HelpIntro | links_name4 = User Guide

| links_url5 = http://groups.google.com/group/zaproxy-develop | links_name5 = Developer Group

| links_url6 = http://groups.google.com/group/zaproxy-users | links_name6 = User Group

| links_url7 = http://zaproxy.blogspot.co.uk/ | links_name7 = ZAP Blog

| links_url8 = http://freecode.com/projects/zed-attack-proxy-zap | links_name8 = Freecode page

| links_url9 = https://www.owasp.org/index.php/GPC_Project_Assessment/OWASP_Zed_Attack_Proxy_Project/ZAP_1.3.0 | links_name9 = Releases ZAP 1.3.0 / Assessment Process Control

| release_1 = ZAP 1.4.0

| release_2 = ZAP 1.4.1

| release_3 = ZAP 2.0.0

| release_4 = ZAP 2.1.0

| release_5 = ZAP 2.2.0

| release_6 = ZAP 2.2.2

| release_7 = ZAP 2.3.0

| project_about_page = Projects/OWASP_Zed_Attack_Proxy_Project }}