|
| 1 | +--- |
| 2 | +# A simple plan that performs a full authenticated scan against https://github.com/digininja/DVWA. |
| 3 | +# It only uses the standard spider as DVWA is a traditional app. |
| 4 | +# The spider will fail the plan if it finds less that 100 URLs as that implies something way wrong. |
| 5 | +# Various URLs are excluded to prevent the scan from breaking the app, |
| 6 | +# e.g. by resetting the db or changing the admin password. |
| 7 | +env: |
| 8 | + contexts: |
| 9 | + - name: "DVWA-form" |
| 10 | + urls: |
| 11 | + - "http://localhost:4280" |
| 12 | + includePaths: |
| 13 | + - "http://localhost:4280.*" |
| 14 | + excludePaths: |
| 15 | + - "http://localhost:4280/logout.php" |
| 16 | + - "http://localhost:4280/login.php" |
| 17 | + - "http://localhost:4280/setup.php" |
| 18 | + - "http://localhost:4280/security.php" |
| 19 | + - "http://localhost:4280/vulnerabilities/csrf.*" |
| 20 | + authentication: |
| 21 | + method: "form" |
| 22 | + parameters: |
| 23 | + loginRequestBody: "username={%username%}&password=password&Login=Login&user_token=f4c2be9fba02186111829f053797c917" |
| 24 | + loginPageUrl: "http://localhost:4280/login.php" |
| 25 | + loginRequestUrl: "http://localhost:4280/login.php" |
| 26 | + verification: |
| 27 | + method: "poll" |
| 28 | + loggedInRegex: "\\Qadmin\\E" |
| 29 | + pollFrequency: 60 |
| 30 | + pollUnits: "requests" |
| 31 | + pollUrl: "http://localhost:4280/instructions.php" |
| 32 | + pollPostData: "" |
| 33 | + sessionManagement: |
| 34 | + method: "headers" |
| 35 | + parameters: |
| 36 | + Cookie: "PHPSESSID={%cookie:PHPSESSID%}; security=low" |
| 37 | + technology: |
| 38 | + exclude: [] |
| 39 | + include: [] |
| 40 | + users: |
| 41 | + - name: "test" |
| 42 | + credentials: |
| 43 | + password: "password" |
| 44 | + username: "admin" |
| 45 | + parameters: |
| 46 | + failOnError: true |
| 47 | + failOnWarning: false |
| 48 | + progressToStdout: true |
| 49 | + continueOnFailure: false |
| 50 | + vars: {} |
| 51 | +jobs: |
| 52 | +- parameters: |
| 53 | + context: "DVWA-form" |
| 54 | + user: "test" |
| 55 | + url: "" |
| 56 | + maxDuration: 0 |
| 57 | + maxDepth: 0 |
| 58 | + maxChildren: 0 |
| 59 | + name: "spider" |
| 60 | + type: "spider" |
| 61 | + tests: |
| 62 | + - onFail: "ERROR" |
| 63 | + statistic: "automation.spider.urls.added" |
| 64 | + site: "" |
| 65 | + operator: ">=" |
| 66 | + value: 100 |
| 67 | + name: "At least 100 URLs found" |
| 68 | + type: "stats" |
| 69 | +- parameters: |
| 70 | + context: "DVWA-form" |
| 71 | + user: "test" |
| 72 | + policy: "" |
| 73 | + maxRuleDurationInMins: 0 |
| 74 | + maxScanDurationInMins: 0 |
| 75 | + maxAlertsPerRule: 0 |
| 76 | + name: "activeScan" |
| 77 | + type: "activeScan" |
| 78 | +- parameters: {} |
| 79 | + name: "passiveScan-wait" |
| 80 | + type: "passiveScan-wait" |
| 81 | +- parameters: |
| 82 | + template: "modern" |
| 83 | + reportTitle: "ZAP Scanning Report" |
| 84 | + reportDescription: "" |
| 85 | + name: "report" |
| 86 | + type: "report" |
0 commit comments