The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.

Slides:



Advertisements
Similar presentations
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
OWASP Xenotix XSS Exploit Framework
Into the Mind of the Hacker: Hands-On Web Application Hacking Adam Doupé University of California, Santa Barbara 4/23/12.
EValid Getting Started. Agenda Introduction to eValid First experience of using eValid Recording and Site Analysis in eValid.
What is OWASP OWASP Live CD Live Demo Omar Sherin-OWASP Egypt.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Introduction to Application Penetration Testing
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Classroom User Training June 29, 2005 Presented by:
Selenium Web Test Tool Training Using Ruby Language Discover the automating power of Selenium Kavin School Kavin School Presents: Presented by: Kangeyan.
Selenium Web Test Tool Training Using Ruby Language Discover the automating power of Selenium Kavin School Kavin School Presents: Presented by: Kangeyan.
| | Tel: | | Computer Training & Personal Development Microsoft Office PowerPoint 2007 Expert.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Introduction Purpose This course describes the process of installing the KPIT GNU toolchain on your PC. Objective Learn how easy it is to get information.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
How KeePass password safe can save you time and energy
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
HTML Hyper Text Markup Language A simple introduction.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Sponsors Gold Silver Bronze Custom REST services and jQuery AJAX Building your own custom REST services and consuming them with jQuery AJAX.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Introduction to Web AppBuilder for ArcGIS: JavaScript Apps Made Easy
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Selenium Web Test Tool Training Discover The Automating Power Of Selenium Author : Girija Prasad Panda Alcatel-Lucent.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
What is Web Site Administration Tool ? WAT Allow you to Configure Web Site With Simple Interface –Manage Users –Manage Roles –Manage Access Rules.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
GOSS iCM Gary Ratcliffe. 2 Agenda Webinar Programme V10 Overview Version Information Supported Browsers Architectural Changes New Features.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Presentation Title Subtitle DSpace UI Prototype 7 Spring, Angular.js, and the DSpace REST API.
UNDERSTANDING YOUR OPTIONS FOR CLIENT-SIDE DEVELOPMENT IN OFFICE 365 Mark Rackley
MIS Week 5 Site:
Excel Services Displays all or parts of interactive Excel worksheets in the browser –Excel “publish” feature with optional parameters defined in worksheet.
Allison Nichols, Ed.D. Evaluation Specialist.  In this workshop we'll explore creating an online survey using Google Documents. You don't need to buy.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
Strategic Security, Inc. © Burp Suite Presented By: Joe McCray
Arklio Studija 2007 File: / / Page 1 Automated web application testing using Selenium
ArcGIS for Server Security: Advanced
Create Online Surveys for Free by Using Google Documents
Web Programming Language
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
WEB APPLICATION TESTING
OWASP WebGoat v5 16 April 2010.
HTML Level II (CyberAdvantage)
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
An Introduction to ZAP The OWASP Zed Attack Proxy
Presentation transcript:

The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. OWASP Canberra 2014 OWASP ZAP Workshop 1: Getting started Simon Bennetts OWASP ZAP Project Lead Mozilla Security Team

The plan Introduction The main bit Demo feature Let you play with feature Answer any questions Repeat Plans for the future sessions 2

3 What is ZAP? An easy to use webapp pentest tool Completely free and open source Ideal for beginners But also used by professionals Ideal for devs, esp. for automated security tests Becoming a framework for advanced testing Included in all major security distributions ToolsWatch.org Top Security Tool of 2013 Not a silver bullet!

4 ZAP Principles Free, Open source Involvement actively encouraged Cross platform Easy to use Easy to install Internationalized Fully documented Work well with other tools Reuse well regarded components

5 Statistics Released September 2010, fork of Paros V released in May 2014 V downloaded > 35K times Translated into 20+ languages Over 90 translators Mostly used by Professional Pentesters? Paros code: ~20% ZAP Code: ~80%

6 Open HUB Statistics Very High Activity The most active OWASP Project 31 active contributors 327 years of effort Source:

Some ZAP use cases Point and shoot – the Quick Start tab Proxying via ZAP, and then scanning Manual pentesting Automated security regression tests Debugging Part of a larger security program 7

The BodgeIt Store A simple vulnerable web app Easy to install, minimal dependencies In memory db Scoring page – how well can you do? 8

The ZAP UI Top level menu Top level toolbar Tree window Workspace window Information window Footer 9

Quick Start - Attack Specify one URL ZAP will spider that URL Then perform an Active Scan And display the results Simple and effective Little control & cant handle authentication 10

Proxying via ZAP Plug-n-Hack easiest option, if using Firefox Otherwise manually configure your browser to proxy via ZAP And import the ZAP root CA Requests made via your browser should appear in the Sites & History tabs IE – dont “Bypass proxy for local addresses” 11

ZAP PnH

Manual ZAP config

Practical 1 Try out the Quick Start – Attack Configure your browser to proxy via ZAP Manually explore your target application 18

The Spiders Traditional Spider Fast Cant handle JavaScript very well AJAX Spider Launches a browser Slower Can handle Java Script 19

Practical 2 Use the 'traditional' spider on your target application Use the AJAX spider on your target application If you're using BodgeIt – can you find the 'hidden' content? 20

Answer: Hidden content

Active and Passive Scanning Passive Scanning is safe Active Scanning in NOT safe Only use on apps you have permission to test Launch via tab or 'attack' right click menu Effectiveness depends on how well you explored your app 22

Practical 3 Review the Passive issues already found Run the Active Scanner on your target application If you're using BodgeIt – Can you login as user1 or admin? Can you get an “XSS” popup? 23

Answer: Login as… Password guessing password SQL Injection or ‘1’=‘1 or ‘1’=‘1

Answer: XSS popup Search function Append alert(“XSS”)

Intercepting and changing Break on all requests Break on all responses Submit and step Submit and continue Bin the request or response Add a custom HTTP break point 26

Practical 4 Intercept and change requests and responses Use custom break points just on a specific page If you're using BodgeIt – can you make some money via the basket? 27

Answer: Make money Your Basket page Change quantity to negative number quantity_26=-5&update=Update+ Basket

Some final pointers Generating reports Save sessions at the start Right click everywhere Play with the UI options Explore the ZAP Marketplace F1: The User Guide Menu: Online / ZAP User Group 29

30 Future Sessions? Fuzzing Advanced Active Scanning Contexts Authentication Scripts Zest The API Websockets What do you want??

Any Questions?