-
-
Notifications
You must be signed in to change notification settings - Fork 136
HelpAddonsFuzzDialogue
thc202 edited this page Jun 24, 2015
·
4 revisions
This allows you to select the fuzzers to use when fuzzing a request.
To configure the fuzzing:
- Highlight a string you wish to fuzz in the Fuzz Locations tab
- Click the 'Add...' button to launch the Payloads dialog
- Add the payloads you want to use
- Click on the 'Processors...' button to launch the Location Processors dialog (if required)
- Click on the 'Start Fuzzer' button to start the fuzzing
- The results will then be listed in the Fuzzer tab select them to see the full requests and responses.
You can also search for strings in the fuzz results using the 'Search tab'.
This tab allows you to configure the options to be used when fuzzing.
Message Processors can access and change the fuzzing requests and responses, control the fuzzing process and interact with the ZAP UI.
The following types of message processors are provided by default:
- Payload Reflection Detector
- Request Content-Length Updater
- User message processor
You can write custom HTTP Message Processor scripts, which allow you to
- Obtain the list of payloads
- Stop fuzzing
- Increase the error count
- Send new messages
- Add messages to the Results tab[link]
- Set custom ‘state’ messages in the Fuzzer tab
- Raise alerts
Add-ons can also define additional payload generators.
Request tab | 'Fuzz...' right click menu item | |
Sites and History tab | Attack > Fuzz... menu items | |
Tools menu | Attack > Fuzz... menu item |
Fuzzer concepts |
-
ZAP User Guide
- Introduction
-
Getting Started
- Configuring proxies
-
Features
- Active Scan
- Add-ons
- Alerts
- Anti CSRF Tokens
- API
- Authentication
- Break Points
- Callbacks
- Contexts
- Data Driven Content
- Filters
- Globally Excluded URLs
- HTTP Sessions
- Man-in-the-middle Proxy
- Modes
- Notes
- Passive Scan
- Scan Policies
- Scope
- Session Management
- Spider
- Statistics
- Structural Modifiers
- Structural Parameters
- Tags
- Users
- Scanner Rules
- A Simple Penetration Test
-
The User Interface
- Overview
- The Top Level Menu
- The Top Level Toolbar
- The Tabs
-
The Dialogs
- Active Scan
- Add Alert
- Add Break Point
- Add Note
- Encode/Decode/Hash
- Filter
- Find
- History Filter
- Manual Request Editor
- Manage Add-ons
- Manage Tags
-
Options
- Active Scan
- Active Scan Input Vectors
- Alerts
- Anti CSRF Tokens
- API
- Breakpoints
- Callback Address
- Certificate
- Check for Updates
- Connection
- Database
- Display
- Dynamic SSL Certificates
- Extensions
- Global Exclude URL
- HTTP Sessions
- JVM
- Keyboard
- Language
- Local Proxies
- Passive Scan Rules
- Passive Scan Tags
- Passive Scanner
- Rule Configuration
- Scripts
- Search
- Spider
- Statistics
- Persist Session
- Resend
- Scan Policy Manager
- Scan Progress
- Session
- Spider
- The Footer
- Command Line
- Add Ons
- Releases
- Paros Proxy
- Credits