You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/main/webapp/lesson_plans/en/UsefulTools.html
+18-21Lines changed: 18 additions & 21 deletions
Original file line number
Diff line number
Diff line change
@@ -2,29 +2,25 @@
2
2
<!-- Start Instructions -->
3
3
<h1>Useful Tools</h1>
4
4
<p>
5
-
Below is a list of tools we've found useful in solving the WebGoat lessons. You will need WebScarab or Paros to solve most of the lessons. </p>
6
-
<h2>WebScarab:</h2>
5
+
Below is a list of tools we've found useful in solving the WebGoat lessons. You will need a proxy like OWASP ZAP or Paros to solve most of the lessons. </p>
6
+
<h2>OWASP ZAP:</h2>
7
7
<p>
8
-
Like WebGoat, WebScarab is a part of OWASP.
9
-
WebScarab is a proxy for analyzing applications that
10
-
communicate using the HTTP and HTTPS protocols. Because WebScarab
11
-
operates as an intercepting proxy, we can review and modify requests
Like WebGoat, Zed Attack Proxy (ZAP) is a part of OWASP and is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.
9
+
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.
10
+
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually..<br><br>
<br>The .jar install file can be found at the <ahref="http://code.google.com/p/zaproxy/wiki/Downloads?tm=2">OWASP ZAP Google Code Project</a></p>
14
+
<p>After installing ZAP and configuring your browser to use it as a proxy on localhost we can start. To intercept a request,
15
+
click the green arrow icon turning it red. If we browse a WebGoat page, ZAP will intercept the HTTP request.
16
+
Here we can read and edit the intercepted parameters and headers. After editing is complete press the play icon to submit the request to the server.<br>
Wireshark is a network protocol analyzer. You can sniff network traffic and gather useful
@@ -34,11 +30,12 @@ <h2>Wireshark</h2>
34
30
35
31
</p>
36
32
37
-
<h2>Scanner:</h2>
33
+
<h2>Scanners (Attacking Proxies):</h2>
38
34
<p>
39
-
There are many vulnerability scanners for your own web applications. They can find XSS, Injection Flaws and other vulnerabilities. Below are links to two open source scanner. <br><br>
35
+
There are many vulnerability scanners for your own web applications. They can find XSS, Injection Flaws and other vulnerabilities. Below are links to three open source scanners. <br><br>
0 commit comments