
{"id":1871,"date":"2012-07-23T17:08:24","date_gmt":"2012-07-23T20:08:24","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1871"},"modified":"2012-08-05T10:52:27","modified_gmt":"2012-08-05T13:52:27","slug":"reportes-owasp-zed-attack-proxy","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/","title":{"rendered":"Reportes OWASP Zed Attack Proxy"},"content":{"rendered":"<p><a href=\"http:\/\/www.talsoft.com.ar\/index.php\/research\/tools\/reporte-extension-zap-proxy-owasp\/zap128x128\" rel=\"attachment wp-att-1866\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-1866\" title=\"Zap128x128\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png\" alt=\"\" width=\"128\" height=\"128\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Zed Attack Proxy (ZAP)<\/strong>\u00a0es una herramienta de penetration test para la b\u00fasqueda de vulnerabilidades en aplicaciones web.\u00a0Est\u00e1 dise\u00f1ada para ser utilizado por personas con una amplia gama de experiencia en seguridad y\u00a0\u00fatil\u00a0para desarrolladores. \u00a0ZAP ofrece esc\u00e1neres autom\u00e1ticos, as\u00ed como un conjunto de herramientas que le permiten encontrar las vulnerabilidades de seguridad de forma manual.<\/p>\n<p><strong>TalSoft SRL<\/strong>, participa en el proyecto\u00a0<a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Zed_Attack_Proxy_Project\" rel=\"nofollow\">OWASP Zed Attack Proxy<\/a>\u00a0en una\u00a0extensi\u00f3n\u00a0para\u00a0generaci\u00f3n\u00a0de reporte de alertas.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sitio de OWASP ZAP:\u00a0<\/strong><a href=\"http:\/\/www.owasp.org\/index.php\/OWASP_Zed_Attack_Proxy_Project\"><strong>Aqu\u00ed<\/strong><\/a><\/p>\n<p><strong>Sitio de Extensiones:\u00a0<\/strong><a href=\"https:\/\/code.google.com\/p\/zap-extensions\/\"><strong>Aqu\u00ed<\/strong><\/a><\/p>\n<h3>Instalaci\u00f3n<\/h3>\n<p>Esta\u00a0extensi\u00f3n\u00a0se puede descargar y copiarla en la carpeta\u00a0<em>Plugins<\/em>\u00a0del ZAP Proxy para cargarlo.<\/p>\n<p><strong>Nota<\/strong>: \u00a0puede ser necesario setear el siguiente\u00a0par\u00e1metro\u00a0en la\u00a0ejecuci\u00f3n\u00a0de Java 6.0:\u00a0\u00a0-XX:PermSize=256M<\/p>\n<h3>Caracter\u00edsticas<\/h3>\n<ul>\n<li>Genera reportes de alertas seleccionadas.<\/li>\n<li>Genera un reporte general de todas las alertas.<\/li>\n<li>Formato de\u00a0exportaci\u00f3n\u00a0PDF o ODT.<\/li>\n<li>Permite adjuntar un documento que se agrega antes del reporte generado.<\/li>\n<li>Personalizaci\u00f3n\u00a0de datos del reporte, como Nombre del Cliente, Autor del documento, Nombre de la empresa, etc.<\/li>\n<li>Genera los pasos para reproducir cada alerta con el detalle de cada paso y su imagen. Previamente completando los datos en los detalles de la alerta y configurando el\u00a0directorio\u00a0de\u00a0im\u00e1genes.<\/li>\n<\/ul>\n<div><strong><br \/>\n<\/strong><\/div>\n<h3>Modo de Uso<\/h3>\n<h4>Generar reporte de alertas<\/h4>\n<p>1. En la solapa de\u00a0<strong>Alertas<\/strong>, elegir una o varias Alerta y \u00a0haciendo click con el\u00a0bot\u00f3n\u00a0derecho, seleccionar<strong><em>\u00a0Export Alert<\/em>\u00a0<\/strong>del men\u00fa<\/p>\n<p><a href=\"http:\/\/www.talsoft.com.ar\/index.php\/research\/tools\/reporte-extension-zap-proxy-owasp\/extensionreportalertsoptions1\" rel=\"attachment wp-att-1854\"><img loading=\"lazy\" decoding=\"async\" title=\"ExtensionReportAlertsOptions1\" src=\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/ExtensionReportAlertsOptions1-400x157.png\" alt=\"\" width=\"400\" height=\"157\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>2. Luego seleccionar la ruta en donde guardar el reporte.<\/p>\n<h4>Generar reporte general<\/h4>\n<ol>\n<li>Desde el\u00a0men\u00fa\u00a0de\u00a0<strong>Report<\/strong>, seleccionar\u00a0<strong><em>Generate Alerts Report<\/em><\/strong><\/li>\n<\/ol>\n<h3>Opciones del Reporte<\/h3>\n<p>Para la\u00a0generaci\u00f3n\u00a0del reporte se pueden modificar las opciones del reporte como:<\/p>\n<ul>\n<li>Nombre del Reporte<\/li>\n<li>Nombre del Cliente<\/li>\n<li>Nombre de la Empresa<\/li>\n<li>Documento para adjuntar en formato ODT o PDF<\/li>\n<li>Tipo de reporte a exportar ODT o PDF<\/li>\n<li>Keywords del documento<\/li>\n<li>Autor del Documento<\/li>\n<li>Texto de Confidencialidad<\/li>\n<li>Logo de la Empresa<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Zed Attack Proxy (ZAP)\u00a0es una herramienta de penetration test para la b\u00fasqueda de vulnerabilidades en aplicaciones web.\u00a0Est\u00e1 dise\u00f1ada para ser utilizado por personas con una amplia gama de experiencia en seguridad y\u00a0\u00fatil\u00a0para desarrolladores. \u00a0ZAP ofrece esc\u00e1neres autom\u00e1ticos, as\u00ed como un conjunto de herramientas que le permiten encontrar las vulnerabilidades de seguridad de forma manual. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1871","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Reportes OWASP Zed Attack Proxy<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Reportes OWASP Zed Attack Proxy\",\"datePublished\":\"2012-07-23T20:08:24+00:00\",\"dateModified\":\"2012-08-05T13:52:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/\"},\"wordCount\":331,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Reportes OWASP Zed Attack Proxy\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png\",\"datePublished\":\"2012-07-23T20:08:24+00:00\",\"dateModified\":\"2012-08-05T13:52:27+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Reportes OWASP Zed Attack Proxy","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Reportes OWASP Zed Attack Proxy","datePublished":"2012-07-23T20:08:24+00:00","dateModified":"2012-08-05T13:52:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/"},"wordCount":331,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/","url":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Reportes OWASP Zed Attack Proxy","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png","datePublished":"2012-07-23T20:08:24+00:00","dateModified":"2012-08-05T13:52:27+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/reportes-owasp-zed-attack-proxy\/#primaryimage","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2012\/07\/Zap128x128.png","width":"128","height":"128"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1871"}],"version-history":[{"count":7,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1871\/revisions"}],"predecessor-version":[{"id":1892,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1871\/revisions\/1892"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}