Projects/OWASP Zed Attack Proxy Project/Pages/Talks
2014 July 10: OWASP Columbus Code Jam, One Easton Ova, Suite 175, Columbus, OH: Bill Sempf: OWASP Code Jam
Get together and code!
This month we'll work on Zest scripting in Zed Attack Proxy.
And a little Violent Python.
2014 August 6: Black Hat Arsenal, Las Vegas, NV: Simon Bennetts: OWASP ZAP
The Zed Attack Proxy (ZAP) is currently the most active open source web application security tool and competes effectively with commercial tools.
While it is an ideal tool for people new to appsec, it also has many features specifically intended for advanced penetration testing.
Simon will give a quick introduction to ZAP and then dive into the more advanced features as well as giving an overview of where its heading.
2014 September 28 - October 2: JavaOne, San Fransisco, CA: Simon Bennetts: Security Testing for Developers Using OWASP ZAP
Any application exposed to the internet will be attacked, and the earlier in the development cycle you find vulnerabilities, the better.
This session introduces the OWASP Zed Attack Proxy (ZAP), a free, open source, Java-based integrated penetration testing tool for finding vulnerabilities in web applications.
Although ZAP is widely used by security professionals, it is also ideal for anyone new to web application security and includes features specifically aimed at developers.
The session shows how ZAP can be used to find vulnerabilities, both manually and as part of an automated build. It also provides an overview of some of the more advanced features and explains how they can be used for more-complex security testing.