Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Nouveaux articles (fr): 1pwnthhW21zdnQ5WucjmnF3pk9puT5fDF
Amélioration du site: 1hckU85orcGCm8A9hk67391LCy4ECGJca

Contribute to SecuObs by sending bitcoins or dogecoins.

Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Appaloosa AppDome nouent un partenariat pour accompagner les entreprises dans le déploiement et la protection des applications mobiles
- D-Link offre une avec un routeur VPN sans fil AC
- 19 mai Paris Petit-Déjeuner Coreye Développer son business à l'abri des cyberattaques
- POYNTING PRESENTE LA NOUVELLE ANTENNE OMNI-291, SPECIALE MILIEU MARITIME, CÔTIER ET MILIEU HUMIDE
- Flexera Software Les utilisateurs français de PC progressent dans l'application de correctifs logiciels, mais des défis de tailles subsistent
- Riverbed lance SD-WAN basé sur le cloud
- Fujitsu multi-récompensé VMware lui décerne plusieurs Partner Innovation Awards à l'occasion du Partner Leadership Summit
- Zscaler Private Access sécuriser l'accès à distance en supprimant les risques inhérents aux réseaux privés virtuels
- QNAP annonce la sortie de QTS 4.2.1
- Une enquête réalisée par la société de cyber sécurité F-Secure a décelé des milliers de vulnérabilités graves, potentiellement utilisables par des cyber criminels pour infiltrer l'infrastru
- Trouver le juste équilibre entre une infrastructure dédiée et cloud le dilemme de la distribution numérique
- 3 juin - Fleurance - Cybersécurité Territoires
- Cyber-assurances Seules 40 pourcents des entreprises françaises sont couvertes contre les violations de sécurité et les pertes de données
- Des étudiants de l'ESIEA inventent CheckMyHTTPS un logiciel qui vérifie que vos connexions WEB sécurisées ne sont pas interceptées
- Les produits OmniSwitch d'Alcatel-Lucent Enterprise ALE gagnent en sécurité pour lutter contre les cyber-attaques modernes

Dernier articles de SecuObs :
- DIP, solution de partage d'informations automatisée
- Sqreen, protection applicative intelligente de nouvelle génération
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles

Revue de presse internationale :
- VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack
- Demand letter served on poll body over disastrous Comeleak breach
- The Minimin Aims To Be The Simplest Theremin
- Hacking group PLATINUM used Windows own patching system against it
- Hacker With Victims in 100 Nations Gets 7 Years in Prison
- HPR2018 How to make Komboucha Tea
- Circuit Bender Artist bends Fresnel Lens for Art
- FBI Director Suggests iPhone Hacking Method May Remain Secret
- 2016 Hack Miami Conference May 13-15, 2016
- 8-bit Video Wall Made From 160 Gaming Keyboards
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance
- BeautifulPeople.com experiences data breach 1m affected
- Swedish Air Space Infringed, Aircraft Not Required
- Why cybercriminals attack healthcare more than any other industry
- Setting the Benchmark in the Network Security Forensics Industry

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [Infratech - release] version 0.6 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- Mises à jour en perspective pour le système Vigik
- USBDumper 2 nouvelle version nouvelles fonctions !
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- La sécurité des clés USB mise à mal par USBDUMPER
- Une faille critique de Firefox expose les utilisateurs de Tor Browser Bundle
- Installation sécurisée d'Apache Openssl, Php4, Mysql, Mod_ssl, Mod_rewrite, Mod_perl , Mod_security

Top bi-hebdo de la revue de presse
- StackScrambler and the Tale of a Packet Parsing Bug

Top bi-hebdo de l'annuaire des videos
- DC++ Botnet. How To DDos A Hub With Fake IPs.
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Defcon 14 Hard Drive Recovery Part 3

Top bi-hebdo de la revue Twitter
- RT @secureideas: I believe that all the XSS flaws announced are fixed in CVS. Will test again tomorrow if so, release 1.4.3. #BASESnort
- Currently, we do not support 100% of the advanced PDF features found in Adobe Reader... At least that's a good idea.
- VPN (google): German Foreign Office Selects Orange Business for Terrestrial Wide: Full
- @DisK0nn3cT Not really, mostly permission issues/info leak...they've had a couple of XSS vulns but nothing direct.
- Swatting phreaker swatted and heading to jail: A 19-year-old American has been sentenced to eleven years in pris..
- RT @fjserna You are not a true hacker if the calc.exe payload is not the scientific one... infosuck.org/0x0035.png

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux

toolsmith OWASP ZAP - Zed Attack Proxy

Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]

S'abonner au fil RSS global de la revue de presse



toolsmith OWASP ZAP - Zed Attack Proxy

Par HolisticInfoSec.org
Le [2011-11-03] à 06:33:40



Présentation : PrerequisitesJava Runtime EnvironmentZAP runs on Linux, Mac OS X, and Windows HappyThanksgiving As we express ourgratitude, we must never forget that the highest appreciation is not to utterwords, but to live by them. -JFK IntroductionNovember 2011 s toolsmith is the 61st in theseries for the ISSA Journal, thus marking five years of extensive toolsanalysis for information security practitioners. Thank you for coming along forthe ride.Fresh on the heels of a successful presentation on OWASPTop 10 Tools and Tactics at an even more successful ISSA International inBaltimore I was motivated to give full coverage this month to the OWASP ZedAttack Proxy, better known as ZAP. I had presented ZAP as a tool of choice whenassessing OWASP Top Ten A1 Injection but, as so many of the tools discussed,ZAP delivers plenty of additional functionality worthy of in-depth discussion.OWASP ZAP is a fork of the once favored Paros Proxy,which has not been updated since August 2006. As such, it should be noted withno small irony that we covered Paros in December 2006 this is an excellentopportunity to show you how far ZAP has come from the original project.ZAP is the result of Simon Bennetts Psiinon hard work,though he s got help from co-lead Axel Neumann a_c_neumann and manycontributors.As an official OWASP project, ZAP enjoys extensive useand development support as an easy to use integrated penetration testing toolfor finding vulnerabilities in web applications. Simon offered a veritable plethora of feedback for thisarticle, as provided throughout the rest of the introduction. He indicated thathe originally released ZAP specifically for developers and functional testers a group which he believes is poorly represented in the security tools market.Ease of use was a prime concern, as was documentation andto his surprise it turned out that it was the security folk who took up ZAP thequickest, providing great feedback, reporting issues and asking for lots ofenhancements. Simon still wants ZAP to be ideal for people new to web applicationsecurity but it s also going to be enhanced with more and more advancedfeatures aimed at profession penetration testers.Simon also wanted ZAP to be a community project thereare many open source security tools that are tightly controlled by oneindividual or company. While he doesn t have a problem with that fact he does believethat the real strength of open source comes when anyone can contribute to aproject and take it in directions its initial developers never envisaged.Anyone and everyone is welcome to contribute to ZAP, andnot necessarily coding only they welcome help with testing, documentation,localization, issues identification and enhancement requests. Help spread theword as well via articles, reviews, videos, blogs, Twitter, etc.ZAP is also one of the few open source security tools tobe fully internationalized. It has been translated into 10 languages and downloadstatistics indicate that approximately half of the ZAP users worldwide arelikely to be non-native English speakers.ZAP is intended to provide everything that you need toperform a penetration test on a web application.If you are new to web application security then it mightbe the only security tool you need. However, if you're an experiencedpenetration tester be sure to include it as one of the many tools in yourtoolbox.As a result, the development team is trying to make it aseasy as possible to integrate ZAP with other tools. They provide a way toinvoke other applications from within ZAP passing across the current context.In version 1.3 they introduced an API which allows the core ZAP functionalityto be invoked by a REST API, and will be extended to cover even more of ZAP'sfeatures in future releases.This is an ideal way for other applications to directlydrive ZAP, and can be used when ZAP is running in 'headless' mode i.e. withoutthe UI .They've also put together a POC showing how ZAP can beused by developers to include basic security tests in their continuousintegration framework and be alerted to potential security vulnerabilitieswithin hours of checking code.Simon and team don t believe in reinventing the wheel,which is why they always seek high quality open source components to reusebefore implementing a new feature from scratch.As such, the brute force forced browsing support isprovided via DirBuster andfuzzing makes use of the JBroFuzz libraries both OWASP projects .Amongst the more advanced features that users might notbe aware of is that ZAP keeps track of all of the anti-CSRF tokens it finds. Iffuzzing a form with an anti CSRF-token in it, ZAP can regenerate the token foreach of the payloads you fuzz with. There s also an experimental option thatallows this to be turned on when using the active scanner as well. I can saythat quality CSRF testing is not commonplace among ZAP s web applicationtesting contemporaries.For ZAP version 1.4 the development team has decided tofocus on Improving the active and passive scanners Improving stability especially for large sites Session token analysisIn July 2011 ZAP was evaluated and designated as a'stable' OWASP project, the highest level currently available. Further, OWASPprojects are now being restructured ZAP has been designated as one of thesmall number of 'flagship' projects. Rightfully so thank you Simon.Let s run ZAP through its paces. ZAP Installationand Configuration ZAP is installation is very simple. Once unpacked on yourpreferred platform, invoke ZAP from the application icon or at the commandprompt via the appropriate executable. A current Java Runtime Environment is arequirement as all the executables EXE, BAT, SH invoke java jar zap.jar org.zaproxy.xap.ZAP.Most importantly ZAP, runs as a proxy. Configure yourpreferred browser to proxy via localhost and the default port of 8080. I changethe port to 8088 to avoid conflict with other proxies and services. You canchange the port under Tools àOptions àLocal proxy if you run multiple proxies that you bounce between duringassessments. I do and as such I use the Firefox add-on FoxyProxy to quicklydial in my proxy of choice. You must also generate an SSL certificate in order to useand test SSL enabled sites. You will be prompted to do when running ZAP for thefirst time. ZAP Use In addition to the aforementioned Security RegressionTests for developers, the OWASP ZAP project offers ZAP Web ApplicationVulnerability Examples, or ZAP WAVE. Download it and drop zap-wave.war in the webapps directoryof your favorite servlet engine. On Debian Ubuntu systems sudo apt-get install tomcat6 will getyou in business with said servlet engine quickly. In addition to a LAMP stackon an Ubuntu 11.10 VM I run Tomcat for just such occasions. OWASP WebGoat alsoruns as a standalone test bed or via a servlet engine. Enable ZAP, with your browser configured to proxy throughit, then navigate to the system VM or real steel hosting ZAP WAVE, usually onport 8080. As an example http 192.168.140.137 8080 zapwave .ZAP WAVE includes active vulnerabilities such ascross-site scripting and SQL injection as well as passive vulnerabilitiesincluding three types of information leakage and two session vulnerabilities.There are also pending false positives that are not yetready for primetime.The developers recommend that you explore the target appwith ZAP enabled as a proxy, and touch as much of it as possible beforespidering. Doing so helps ZAP find more vulns as you may cross paths with errormessages, etc.I typically visit the root of the application hierarchyfor a web application I wish to assess, right-click on it, select Attack, then Spider site. This crawls the entire site hierarchy andpopulates the tree view under the Sites tab in ZAP s left pane as seen inFigure 1. Figure 1 ZAP spidering Crawling spidering can have unintended side-effects on anapplication, even adding or deleting records in a database, so be advised.A good crawl ensures a better active scan, but beforebeginning a scan, set your Scan Policy via Analyzeà Scan Policy as seen in Figure 2. You may wish to morenarrowly scope your scan activity to just the likes of information gathering orSQL injection as seen in Figure 2. Figure 2 ZAP scan policy Spidering and scan policyconfiguration complete, right click the root, or a specific node you wish toassess as you can choose Attack à Active scansite or Attack à Active scannode.You can also exclude a sitefrom the scope in a similar fashion.A full scan of the ZAP WAVEinstance completed in very short order results were immediate as seen inFigure 3. Figure 3 ZAP scan results ZAP includes the expectedEncode Decode Hash functionality via Edità Encode Decode Hash or Toolsà Encode Decode Hash along with a manual editor for generating manual requests. I ll oftenrun ZAP for nothing more than encoding, decoding, and hashing it s a greatutility.The Port Scan feature is also useful. It will select the in-scope hostby default just click the Port Scan tab then the start button.The Brute Force tab is a function of the above-mentioned DirBustercomponent and includes seven dictionary lists to choose from. I ran thisagainst my full host VM rather just the servlet element and included thedictionary-list-1.0 dictionary for a simple, quick test. Figure 4 ZAP DirBuster at work One of my favorite ZAP features there are many is the Fuzzer. Per the Fuzzer component guidance Selecta request in the Sites or History tab Highlightthe string you wish to fuzz in the Request tab Rightclick in the Request tab and select 'Fuzz...' Selectthe Fuzz Category and one or more Fuzzers Pressthe Fuzz button Theresults listed in the Fuzzer tab - select them to see the full requests andresponses.The fuzzer, like the scanner,includes functionality which causes ZAP to automatically regenerate the tokenswhen requiredI ran Fuzzer against http 192.168.140.137 8080 zapwave active xss xss-form-anti-csrf.jspand fuzzed the anticsrf and name variables as it is a recentaddition per the ZAP WAVE download site.As seen in Figure 5, thefuzzer offers a wider array fuzzers within a given category. FIGURE 5 ZAP fuzzer config In the understanding thatfuzzing is the art of submitting a great deal of invalid or unexpected data toa target, you can look for variations in results such as response code 200 OK and response times. Where normal response times per request average between 2msand 4ms for ZAP WAVE hosted on a local VM, one request in particular stood out ata 402ms response time. I checked for the string passed and cracked up.pourcents3CIMG SRCpourcents3Dpourcents60javascriptpourcents3Aalertpourcents28pourcents22RSnake sayspourcents23pourcents23pourcents23 pourcents27XSSpourcents27pourcents22pourcents29pourcents60pourcents3EOr,courtesy of the handy ZAP decoder Mr. Slowloris HTTP DoS himselfcausing grind even here. - In Conclusion ZAP deserves its status as an OWASP flagship project.Whether you re a seasoned veteran or new to the web application security gamemake the Zed Attack Proxy part of your arsenal. I d go so far as to say, as2011 is winding down, that ZAP feels like a likely front runner for 2011Toolsmith Tool of the Year. But that is for you to decide, dear reader. Let meknow if you agree.Ping me via email if you have questions russ atholisticinfosec dot org .Cheers until next month. Acknowledgements Simon Bennetts Psiinon forproject feedback and detailsAxel Neumann a_c_neumann for draft review

Les mots clés de la revue de presse pour cet article : attack proxy
Les videos sur SecuObs pour les mots clés : attack proxy
Les éléments de la revue Twitter pour les mots clé : attack proxy



AddThis Social Bookmark Widget



Les derniers articles du site "HolisticInfoSec.org" :

- toolsmith ZeroAccess analysis with OSForensics
- toolsmith Registry Decoder
- Tool review NetworkMiner Professional 1.2
- toolsmith OWASP ZAP - Zed Attack Proxy
- Presenting OWASP Top 10 Tools Tactics at ISSA International
- toolsmith Log Analysis with Highlighter
- toolsmith Memory Analysis with DumpIt and Volatility
- Phorum Phixes Phast
- toolsmith PacketFence - Open Source NAC
- Mark Russinovich presenting at ISSA Puget Sound




S'abonner au fil RSS global de la revue de presse

Menu > Articles de la revue de presse : - l'ensemble [tous | francophone] - par mots clé [tous] - par site [tous] - le tagwall [voir] - Top bi-hebdo de la revue de presse [Voir]



Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail




SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :