-
-
Notifications
You must be signed in to change notification settings - Fork 135
HelpReleases1_3_0
The following changes were made in this release:
Strings in a response can now be fuzzed to try to find vulnerabilities. Anti CRSF tokens can be detected and automatically regenerated when fuzzing. This functionality is based on code from the OWASP JBroFuzz project.
The support for SSL connections was improved and simplified. User's can now create their own root certificate and distribute this into their HTTP clients. See Option: Dynamic SSL Certificates for more details.
Starting ZAP with the "-daemon" command line option will cause it to run in the background in 'headless' mode, meaning that no UI is displayed. An initial API has been implemented in XML, JSON and HTML. If ZAP is running as a daemon then the API is automatically enabled, otherwise the API must be enabled via the Options API screen. The API can be navigated by opening http://zap/ in your browser when proxying via ZAP.
The BeanShell is an interactive Java shell that can be used to execute BeanShell scripts. These scripts are a simplified form of Java that use many elements from Java syntax, but in a simpler scripting format. All Java code is also valid BeanShell code. BeanShell integration in OWASP ZAP enables you to write scripts using the ZAP functions and data set. This can be a very powerful feature for analyzing web applications.
All display string are now fully internationalised.
Out of the box support for the following languages:
English | |
Brazilian Portuguese | |
Chinese | |
French | |
German | |
Greek | |
Indonesian | |
Japanese | |
Polish | |
Spanish |
The Request, Response tabs now provide a 'Hex View' option which will display the request and response bodies in hex format.
The Search tab now displays all instances of a string found rather than just the first instance in each request or response.
URLs can be explicitly excluded from the active scanner, spider and from the proxy.
Most of the panels now provide a 'right click' 'Copy' menu option, including the Port Scan and Brute Force panels.
All of the input fields now support Undo/Redo actions using the operating systems default Undo/Redo accelerators:
- Windows/Linux: Ctrl+Z / Ctrl+Y
- Mac OS X: Cmd+Z / Cmd+Shift+Z
The Port Scanner can now use the outgoing proxy (if configured) and the timeout in milliseconds can also now be set.
There are now 2 'Set Break' buttons to allow breaks to be set on all requests and all responses independently.
There are now 2 buttons which allow you to switch between having the Sites and Information tabs expanded.
While the Break tab is not in use its icon is a grey cross: . When a break point is hit the tab icon is changed to a red cross: .
The Option: Connection screen allows you to set the timeout in seconds to make it easier to test slow applications.
Most of the libraries used by ZAP have been updated to the latest versions.
Thanks to Simon Egli and all others for submitting cool icon suggestions.
Currently Dynamic SSL is not working when using Google Chrome. This is because of an unresolved known issue with Google Chrome and Mac OS X Keychain. When importing OWASP ZAP's Root CA into the keychain and requesting a SSL website, an "Invalid certificate" error message is shown.
Introduction | the introduction to ZAP | |
Releases | the full set of releases | |
Credits | the people and groups who have made this release possible |
-
ZAP User Guide
- Introduction
-
Getting Started
- Configuring proxies
-
Features
- Active Scan
- Add-ons
- Alerts
- Anti CSRF Tokens
- API
- Authentication
- Break Points
- Callbacks
- Contexts
- Data Driven Content
- Filters
- Globally Excluded URLs
- HTTP Sessions
- Man-in-the-middle Proxy
- Modes
- Notes
- Passive Scan
- Scan Policies
- Scope
- Session Management
- Spider
- Statistics
- Structural Modifiers
- Structural Parameters
- Tags
- Users
- Scanner Rules
- A Simple Penetration Test
-
The User Interface
- Overview
- The Top Level Menu
- The Top Level Toolbar
- The Tabs
-
The Dialogs
- Active Scan
- Add Alert
- Add Break Point
- Add Note
- Encode/Decode/Hash
- Filter
- Find
- History Filter
- Manual Request Editor
- Manage Add-ons
- Manage Tags
-
Options
- Active Scan
- Active Scan Input Vectors
- Alerts
- Anti CSRF Tokens
- API
- Breakpoints
- Callback Address
- Certificate
- Check for Updates
- Connection
- Database
- Display
- Dynamic SSL Certificates
- Extensions
- Global Exclude URL
- HTTP Sessions
- JVM
- Keyboard
- Language
- Local Proxies
- Passive Scan Rules
- Passive Scan Tags
- Passive Scanner
- Rule Configuration
- Scripts
- Search
- Spider
- Statistics
- Persist Session
- Resend
- Scan Policy Manager
- Scan Progress
- Session
- Spider
- The Footer
- Command Line
- Add Ons
- Releases
- Paros Proxy
- Credits