Web Application Vulnerability Scanning with OWASP ZAP | TryHackMe

Поделиться
HTML-код
  • Опубликовано: 21 окт 2024

Комментарии • 8

  • @dagmawimasresha
    @dagmawimasresha 2 года назад +1

    thank you for this!

  • @dharmendratelekom1263
    @dharmendratelekom1263 Год назад +1

    Please can you explain the part where we have 301 status codes during the active scan where it saying moved permanently. What does that do on the website? I'm worried if it actually goes in and move the files and contents of the sites messing up everything.

  • @skylerwatson5243
    @skylerwatson5243 Год назад

    After you enter the credential s around the 7-minute mark I don't have any HTTP Sessions available after opening my site. What would be the cause of this?

  • @amadoudiebate1946
    @amadoudiebate1946 2 года назад

    thank you

  • @abdirizak-au
    @abdirizak-au 2 года назад +1

    When scanning with ZAP you are logging in as admin and then trying to get vulnerability. How is that possible in real life scenario. Like this scanner is suppose to simulate your self as attacker, normally attackers don't have the admin username and password and if you have that there is nothing to test. Or am I wrong

    • @zk321
      @zk321 Год назад

      bro this stuff is all fake and unrealistic

    • @MrFiendyBob
      @MrFiendyBob Год назад

      Because we are doing thing ethically not malicious

    • @clintonmelusi9356
      @clintonmelusi9356 Год назад

      bro lets say you build your own site wont you want to test it. so this tool works for both attackers and for defense.