Web Application Security Testing with OWASP ZAP

4.3
stars
215 ratings
Offered By
Coursera Project Network
4,824 already enrolled
In this Guided Project, you will:

Scan websites for vulnerabilities

Setup and use OWASP ZAP Proxy

Use a dictionary list to find files and folders and spider crawl to find links and URLs

Clock1.5 hours
IntermediateIntermediate
CloudNo download needed
VideoSplit-screen video
Comment DotsEnglish
LaptopDesktop only

By the end of this project, you will learn the fundamentals of how to use OWASP Zed Attack Proxy (ZAP). This tool greatly aids security professionals and penetration testers to discover vulnerabilities within web applications. You will learn how to perform a basic web app vulnerability scan, analyze the results, and generate a report of those results. This course includes steps on how to configure the browser proxy to passively scan web requests and responses by simply exploring websites. This course will also include how to use dictionary lists to find files and folders on a web server, and how to spider crawl websites to find all the links and URLs. Finally, the end of the course gives a brief overview of how to intercept, view, modify, and forward web requests that occur between the browser and web application. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.

Learn step-by-step

In a video that plays in a split-screen with your work area, your instructor will walk you through these steps:

  1. Introduction and overview of what OWASP ZAP is and how it is important for web security professionals.

  2. Understand the layout of OWASP ZAP and scan a website for vulnerabilities.

  3. Analyze the OWASP ZAP vulnerability scan results and generate a vulnerability report from those results.

  4. Setup and configure FoxyProxy within the Firefox browser to use ZAP as a proxy.

  5. Find files and directories of a web server using a dictionary list within OWASP ZAP.

  6. Using OWASP ZAP to crawl and spider websites to find links and URLs.

  7. Using OWASP ZAP as a web proxy to intercept a valid request, modify it to make it invalid, and then send it to the web server to provoke unexpected behavior from it.

How Guided Projects work

Your workspace is a cloud desktop right in your browser, no download required

In a split-screen video, your instructor guides you step-by-step

Instructor

Reviews

TOP REVIEWS FROM WEB APPLICATION SECURITY TESTING WITH OWASP ZAP

View all reviews

Frequently asked questions

Frequently Asked Questions

More questions? Visit the Learner Help Center.