Skip to content

Modern Dynamic Analysis suggestions - OWASP ZAP and w3af 404/timeout #2283

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
cipherboy opened this issue Feb 14, 2025 · 1 comment
Open

Comments

@cipherboy
Copy link

Under the dynamic analysis tools:

A dynamic analysis tool examines the software by executing it with specific inputs. For example, the project MAY use a fuzzing tool (e.g., American Fuzzy Lop) or a web application scanner (e.g., OWASP ZAP or w3af). In some cases the OSS-Fuzz project may be willing to apply fuzz testing to your project. For purposes of this criterion the dynamic analysis tool needs to vary the inputs in some way to look for various kinds of problems or be an automated test suite with at least 80% branch coverage. The Wikipedia page on dynamic analysis and the OWASP page on fuzzing identify some dynamic analysis tools. The analysis tool(s) MAY be focused on looking for security vulnerabilities, but this is not required.

AFL/OSS-Fuzz aren't applicable in all situations and general REST API analysis tooling recommendations are useful. It looks like w3af hasn't seen commits in years: https://github.com/andresriancho/w3af -- and OWASP ZAP might have moved to a new home at https://github.com/zaproxy ?

Are there other recommendations for dynamic analysis tools, especially for API-driven services? Perhaps based on OpenAPI scanning?

@psiinon
Copy link
Contributor

psiinon commented Feb 17, 2025

ZAP is no longer an OWASP project, and the correct URL is https://www.zaproxy.org/
For other DAST tools see https://github.com/psiinon/open-source-web-scanners 😁

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants