{"id":6563,"date":"2013-10-02T19:36:48","date_gmt":"2013-10-02T22:36:48","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=6563"},"modified":"2019-07-16T12:30:07","modified_gmt":"2019-07-16T15:30:07","slug":"owasp-zap","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2013\/10\/exploits\/owasp-zap\/","title":{"rendered":"OWASP ZAP"},"content":{"rendered":"<p style=\"text-align: justify;\">Ol\u00e1 Pessoal !!! Bem vindo ao site BackTrack Brasil !!!<\/p>\n<p style=\"text-align: justify;\">A ferramenta OWASP ZAP \u00e9 f\u00e1cil de usar integrada com testes de penetra\u00e7\u00e3o para encontrar vulnerabilidades em aplica\u00e7\u00f5es web. Ela \u00e9 projetada para ser usada por profissionais com uma ampla gama de experi\u00eancia em seguran\u00e7a, portanto \u00e9 ideal para desenvolvedores e aplica\u00e7\u00f5es de pentestes funcionais\u00a0utilizando\u00a0testes de penetra\u00e7\u00e3o. O ZAP fornece \u00a0varreduras \u00a0automatizadas, bem como um conjunto de ferramentas que permitem encontrar vulnerabilidades de seguran\u00e7a manualmente. Site Oficial:\u00a0<a title=\"Owasp ZAP\" href=\"http:\/\/www.owasp.org\/index.php\/OWASP_Zed_Attack_Proxy_Project\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.owasp.org\/index.php\/OWASP_Zed_Attack_Proxy_Project<\/a><\/p>\n<p style=\"text-align: justify;\">O acesso para utilizar a \u00a0ferramenta no Kali \u00e9 bem simples.<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/130.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6573 aligncenter\" title=\"1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/130-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/130-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/130-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/130.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 1<\/p>\n<p style=\"text-align: left;\">O Zap possui uma infraestrutura para pentest completa.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/222.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6576 aligncenter\" title=\"2\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/222-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/222-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/222-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/222.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 2<\/p>\n<p style=\"text-align: left;\">Os testes foram executados em m\u00e1quinas virtuais (sistemas confinados), neste caso foi utilizado a distribui\u00e7\u00e3o vulner\u00e1vel Metasploitable2.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/317.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6578 aligncenter\" title=\"3\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/317-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/317-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/317-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/317.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 3<\/p>\n<p style=\"text-align: left;\">Foi utilizado o IP 192.168.122.25 referente ao sistema Metasploitable2 para varreduras de vulnerabilidades.<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/514.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6580 aligncenter\" title=\"5\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/514-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/514-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/514-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/514.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 4<\/p>\n<p style=\"text-align: left;\">O Zap possibilita varreduras completas para diversos tipos de vulnerabilidades.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/613.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6584 aligncenter\" title=\"6\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/613-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/613-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/613-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/613.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 5<\/p>\n<p style=\"text-align: left;\">\u00c9 gerado alertas completos das vulnerabilidades possibilitando aos desenvolvedores de sistemas\u00a0par\u00e2metros\u00a0para corre\u00e7\u00f5es.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/87.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6586 aligncenter\" title=\"8\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/87-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/87-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/87-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/87.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">fig 6<\/p>\n<p style=\"text-align: left;\">Varredura completas em busca de vulnerabilidades web.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/105.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6588 aligncenter\" title=\"10\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/105-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/105-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/105-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/105.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 7<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1111.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6589\" title=\"11\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1111-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1111-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1111-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1111.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 8<\/p>\n<p style=\"text-align: left;\">O Zap tamb\u00e9m possibilita testes de vulnerabilidades de Cross-site scripting , SQL Injection, Fuzzer e a cria\u00e7\u00e3o de relat\u00f3rios detalhados sobre os sistemas \u00a0web verificados.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1210.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6590 aligncenter\" title=\"12\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1210-300x240.png\"  alt=\"\" width=\"300\" height=\"240\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1210-300x240.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1210-1024x819.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/1210.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 9<\/p>\n<p style=\"text-align: left;\">Um grande abra\u00e7o a todos e at\u00e9 a pr\u00f3xima !!!<\/p>\n\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2012-05-30-12.45.38-1143174_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p>By:\u00a0<a title=\"Grsecurity\" href=\"http:\/\/www.grsecurity.com.br\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Gerson Raymond<\/strong><\/a><\/p>\n<p>T\u00e9cnico em Contabilidade, T\u00e9cnico em Eletr\u00f4nica, T\u00e9cnico em Telecomunica\u00e7\u00f5es, Bacharel em Ci\u00eancia da Computa\u00e7\u00e3o, Administrador de Redes Linux (CentOS, XEN, Zabbix, Asterisk\/Elastix) e P\u00f3s-Graduado em\u00a0<strong><a title=\"Mackenzie\" href=\"http:\/\/www.mackenzie.com.br\/seg_tec_informacao.html\" target=\"_blank\" rel=\"noopener noreferrer\">Seguran\u00e7a em Tecnologia da Informa\u00e7\u00e3o \u2013 UNIVERSIDADE MACKENZIE \u2013 SP<\/a>.<\/strong><\/p>\n<p>Homepage:\u00a0<strong><a title=\"Grsecurity\" href=\"http:\/\/www.grsecurity.com.br\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.grsecurity.com.br<\/a><\/strong><\/p>\n<p><em>\u00a0<\/em>\r\n\t\t<\/div> <!-- .author-info --><\/p>\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes -->\n","protected":false},"excerpt":{"rendered":"<p>Ol\u00e1 Pessoal !!! Bem vindo ao site BackTrack Brasil !!! A ferramenta OWASP ZAP \u00e9 f\u00e1cil de usar integrada com testes de penetra\u00e7\u00e3o para encontrar vulnerabilidades em aplica\u00e7\u00f5es web. Ela \u00e9 projetada para ser usada por profissionais com uma ampla gama de experi\u00eancia em seguran\u00e7a, portanto \u00e9 ideal para desenvolvedores e aplica\u00e7\u00f5es de pentestes funcionais\u00a0utilizando\u00a0testes [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6568,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,21,101],"tags":[],"class_list":["post-6563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos","category-exploits","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=6563"}],"version-history":[{"count":26,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6563\/revisions"}],"predecessor-version":[{"id":10457,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6563\/revisions\/10457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/6568"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=6563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=6563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=6563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}