Skip to content
This repository has been archived by the owner on Sep 15, 2021. It is now read-only.

Key Terminology

dannyprok edited this page Jul 9, 2018 · 3 revisions

Key terminology with reference to the zap-automation library.

Active Scan

ZAP's active scan is an invasive attack. During the active scan ZAP manipulates the requests and attacks the provided testUrl in an attempt to find potential vulnerabilities. An active scan should be run only against services/application that you own for the purpose of security testing.

By default the active scan is turned off in zap-automation library. Teams interested in running an active scan using this library should set activeScan:true in their application.conf.

More information about active scans can be found here.

Context

A Zap context limits the scope of the test to the domain and technologies provided and excludes any routes that needs to be ignored.

The library makes uses of pre-defined parameters in the application.conf to create a Zap context.

More information about ZAP's Context can be found here

Passive Scan

A non invasive scan that checks for security vulnerabilities by analysing the requests and responses that are proxied through via ZAP.

We do not trigger a passive scans as requests/responses are scanned as they're proxied via ZAP.

More information about passive scan can be found here.

Policy

The ZAP policy defines the rules of an active scan. When executed, the library sets up a policy which contains the scanners to be used during the active scan.

More information about Zap Policy can be found here.

Spider Scan

Zap uses the spider scan to discover new resources (URLs) on a particular site within a given context by analysing the contents of the pages it holds in it's session. While the spider scan runs ZAP runs a passive scan against all requests and response.

The zap-automation library uses the testUrl provided in the application.conf as a seed for the spider.

More information about spider scans can be found here.