
{"id":2026,"date":"2013-01-30T15:16:09","date_gmt":"2013-01-30T18:16:09","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=2026"},"modified":"2013-01-30T15:16:09","modified_gmt":"2013-01-30T18:16:09","slug":"owasp-zed-attack-proxy-v-2-0-0","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/","title":{"rendered":"OWASP Zed Attack Proxy v 2.0.0"},"content":{"rendered":"<p>There is a new version of the OWASP Zed Attack Proxy (ZAP) available right now, and there are so many changes in it that we\u2019ve decided to call it version 2.0.0.<\/p>\n<p>If you just want to get stuck in and download it then head over to<a href=\"http:\/\/code.google.com\/p\/zaproxy\/downloads\/list\">http:\/\/code.google.com\/p\/zaproxy\/downloads\/list<\/a>\u00a0: it&#8217;s available for Windows, Linux and Mac OS.<\/p>\n<p>(Note that the Mac OS specific release is coming soon, but the Linux release is actually cross platform and will work fine on Macs)<\/p>\n<p>And if you want to learn a bit more about the changes then read on&#8230;<\/p>\n<p>We can only cover the new features at a high level in one blog post, but the plan is to host a Google hangout demonstrating many of these features at 17:00 UTC on Friday 8th Feb. Details to be announced via\u00a0<a href=\"https:\/\/twitter.com\/zaproxy\">https:\/\/twitter.com\/zaproxy<\/a><\/p>\n<p>Simon will also be presenting a talk at FOSDEM on Feb 2nd:\u00a0<a href=\"https:\/\/fosdem.org\/2013\/schedule\/event\/security_owasp\/\">Practical Security for developers, using OWASP ZAP<\/a><\/p>\n<h3>New features<\/h3>\n<p>An integrated add-ons marketplace<\/p>\n<div dir=\"ltr\">ZAP can be extended by add-ons that have full access to all of the ZAP internals. Anyone can write add-ons and upload them to the ZAP Add-on Marketplace (OK, so its a Google code project called zap-extensions, but you get the idea).<\/div>\n<div dir=\"ltr\">More importantly you can now browse, download and install those add-ons from within ZAP. Most add-ons can be dynamically installed (and uninstalled) so you wont even need a restart.<\/div>\n<div dir=\"ltr\">You can choose to be notified of updates, and even be automatically updated. And as the scan rules are now implemented as add-ons you can get the latest rules as soon as they are published.<\/div>\n<p>A replacement for the &#8216;standard&#8217; Spider<\/p>\n<div dir=\"ltr\">The \u2018old\u2019 Spider was showing its age, so its been completely rewritten, and is much faster and more comprehensive than the old one. This is still a &#8216;traditional&#8217; spider that analyses the HTML code for any links it can find.<\/div>\n<p>A new &#8216;Ajax&#8217; spider<\/p>\n<div dir=\"ltr\">In addition to the &#8216;traditional&#8217; spider we&#8217;ve added an Ajax spider which is more effective with applications that make heavy use of JavaScript. This uses the\u00a0<a href=\"http:\/\/crawljax.com\/\">Crawljax<\/a>\u00a0project which drives a browser (using\u00a0<a href=\"http:\/\/seleniumhq.org\/\">Selenium<\/a>) and so can discover any links an application generates, even ones generated client side.<\/div>\n<p>Web Socket support<\/p>\n<div dir=\"ltr\">ZAP now supports WebSockets, so ZAP can now see all WebSocket messages sent to and from your browser. As with HTTP based messages, ZAP can also intercept WebSocket messages and allows you to change them on the fly.<\/div>\n<div dir=\"ltr\">You can also fuzz WebSockets messages as well using all of the fuzzing payloads included in ZAP from projects like JBroFuzz and fuzzdb. And of course you can easily add your own fuzzing files.<\/div>\n<p>Quick Start tab<\/p>\n<div dir=\"ltr\">The first main tab you will now see is a \u2018Quick Start\u2019 tab which allows you to just type in a URL and scan it with one click.<\/div>\n<div dir=\"ltr\">This is an ideal starting point for people new to application security, but experts can easily remove it if they find it distracting.<\/div>\n<p>Session awareness<\/p>\n<div dir=\"ltr\">ZAP is now session aware, so it can recognise and keep track of multiple sessions. It allows you to create new sessions, switch between them, and applies to all of the other components, like the Spider and Active Scanner.<\/div>\n<p>User defined Contexts<\/p>\n<div dir=\"ltr\">You can now define any number of \u2018contexts\u2019 &#8211; related sets of URLs which make up an application. You can then target all URLs in a context, for example using the Spider or Active Scanner. You can also add the contexts to the scope, and associate other information, such as authentication details.<\/div>\n<p>Session scope<\/p>\n<div dir=\"ltr\">The session scope allows you to specify which contexts you are interested at any one time. You can restrict what you see in various tabs to just the URLs in scope, and prevent accidentally attacking URLs not in scope by using the Protected mode.<\/div>\n<p>Different modes<\/p>\n<div dir=\"ltr\">ZAP now supports 3 modes:<\/div>\n<ul>\n<\/ul>\n<ul>\n<li dir=\"ltr\">Safe, in which no potentially dangerous operations permitted<\/li>\n<li dir=\"ltr\">Protected, in which you can perform any actions on URLs in scope<\/li>\n<li dir=\"ltr\">Standard, in which you can do anything to any URLs<\/li>\n<\/ul>\n<p>A scripting console<\/p>\n<div dir=\"ltr\">This allows you to access any internal ZAP data structures dynamically using any scripting language that supports\u00a0<a href=\"http:\/\/www.jcp.org\/en\/jsr\/detail?id=223\">JSR 223<\/a>,<\/div>\n<p>Authentication handling<\/p>\n<div dir=\"ltr\">You can now associate authentication details with any context, which allows ZAP to do things like detect if and when you are logged out and automatically log you back in again. This is especially useful when used via the API in security regression tests.<\/div>\n<p>More API support<\/p>\n<div dir=\"ltr\">The REST API has been significantly extended, giving you much more access to the functionality ZAP provides.<\/div>\n<p>Fine grained scanning controls<\/p>\n<div dir=\"ltr\">The active scan rules can now be tuned to adjust their strength (the number of attacks they perform) and the threshold at which they report potential issues.<\/div>\n<p>New and improved active and passive scanning rules<\/p>\n<div dir=\"ltr\">We have uploaded the results from running ZAP 2.0.0 against\u00a0<a href=\"http:\/\/code.google.com\/p\/wavsep\/\">wavsep<\/a>\u00a0(the most comprehensive open source evaluation project we are aware of) to the ZAP wiki:<a href=\"http:\/\/code.google.com\/p\/zaproxy\/wiki\/TestingWavsep\">http:\/\/code.google.com\/p\/zaproxy\/wiki\/TestingWavsep<\/a><\/div>\n<div dir=\"ltr\"><\/div>\n<p>Many stability and usability fixes<\/p>\n<div dir=\"ltr\"><\/div>\n<p>Many thanks to everyone who has contributed code, language files, enhancement requests, bug reports and general feedback.<br \/>\nAnd a special mention to the 3 Google Summer of Code students who implemented key features in this release:<\/p>\n<ul>\n<li dir=\"ltr\">Cosmin Stefan : Spider and Session awareness<\/li>\n<li dir=\"ltr\">Guifre Ruiz : Ajax Spider<\/li>\n<li dir=\"ltr\">Robert Koch : WebSockets<\/li>\n<\/ul>\n<p>If you have any questions about this release then you can add a comment here or post them to the<a href=\"http:\/\/groups.google.com\/group\/zaproxy-users\">\u00a0ZAP users group<\/a>.<\/p>\n<p>Fuente:\u00a0<a href=\"http:\/\/owasp.blogspot.co.uk\/2013\/01\/owasp-zed-attack-proxy-v-200.html\">http:\/\/owasp.blogspot.co.uk\/2013\/01\/owasp-zed-attack-proxy-v-200.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a new version of the OWASP Zed Attack Proxy (ZAP) available right now, and there are so many changes in it that we\u2019ve decided to call it version 2.0.0. If you just want to get stuck in and download it then head over tohttp:\/\/code.google.com\/p\/zaproxy\/downloads\/list\u00a0: it&#8217;s available for Windows, Linux and Mac OS. (Note [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-2026","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - OWASP Zed Attack Proxy v 2.0.0<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"OWASP Zed Attack Proxy v 2.0.0\",\"datePublished\":\"2013-01-30T18:16:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/\"},\"wordCount\":928,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - OWASP Zed Attack Proxy v 2.0.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2013-01-30T18:16:09+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - OWASP Zed Attack Proxy v 2.0.0","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"OWASP Zed Attack Proxy v 2.0.0","datePublished":"2013-01-30T18:16:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/"},"wordCount":928,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/","url":"https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - OWASP Zed Attack Proxy v 2.0.0","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2013-01-30T18:16:09+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/owasp-zed-attack-proxy-v-2-0-0\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=2026"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2026\/revisions"}],"predecessor-version":[{"id":2028,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2026\/revisions\/2028"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=2026"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=2026"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=2026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}