OWASP ZAP For Pentesting And Bug Bounties From Scratch FREE
- Basic understanding of web applications required
- Basic understanding of web requests required
- Must be able to verify exploits reports on by tool manually
OWASP Zed Attack Proxy AKA ZAP is a great tool for pen-testers and bug bounty hunters alike. Everyone needs a MitM proxy if they are investigating application traffic and while there are many to pick from, ZAP has distinct advantages over all of them.
Compared to burp suite pro, OWASP ZAP includes the same features but is free.
Compared to Charles proxy, ZAP includes more interactivity.
ZAP has context-dependent UI screens, meaning they only show you what is relevant at that time to avoid screen clutter.
ZAP works with a server/database system, allowing you to easily make and restore snapshots.
We can keep on going on forever about it's clear this is an essential tool for any hacker who takes themselves even the least bit serious. While it may be a bit harder to learn since everyone is used to burp suite, this tutorial aims to guide you through the basics in video format. You can follow along with the instructor and even perform the automated scans on labs that are created by the author.
My name is Wesley Thijs and I've been an instructor for about 3 years now. Before this, I was a QA engineer and since recently also a full-time pentester in my own company. I love seeing people floorish and rise up to the challenges that face us as hackers. Of course, we all know information is free on the internet anywhere we look but it's also this overwhelming feeling of information that led me to start creating courses that follow an easy to follow along guide with labs you can try all this hacking violence on.
Who this course is for:
- Beginner pentesters
- Medior/Senior pentesters who want to learn a new MiTM Proxy
- DevOps Engineers who want to integrate this tool in their CI/CD pipelines
I am the XSS Rat, an experienced ethical hacker who stands for quality and who believes knowledge is a building block we can all use to grow bigger than we ever were. As a software test i have a unique skill set that centers around logic flaws and IDORs which i have not seen very much by other hunters. This gives me the advantage of finding less duplicates and maximizing my chance of finding a vulnerability by picking the correct target and applying the correct test strategy.