Posted: . At: 12:07 PM. This was 4 years ago. Post ID: 13727
Page permalink. WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters.
These cookies expire two weeks after they are set.



Sponsored



Install a nice alternative to Burp suite for scanning websites for vulnerabilities.


Burp suite is very good for scanning websites, but there is also a nice alternative for website application scanning. This is zaproxy. This is a very good alternative for performing this task. It is very easy to install. If you have snap enabled.

4.4 Mon Nov 04 jason@Yog-Sothoth 0: $ snap install zaproxy --classic
zaproxy 2.8.0 from Simon Bennetts (psiinon) installed

Then run it from the command line or the menus to load zaproxy.

zaproxy running on Linux.
zaproxy running on Linux.

Enter a URL and then click attack to scan for vulnerabilities on the target website. This will display any missing items in your HTTP headers, such as missing X-Frame-Options HTTP headers and the absence of Anti-CSRF Tokens to protect against cross-site request forgery. This is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.

Click the report option to create a HTML report detailing all of the issues found on the website. This will also scan the website for Private IP addresses that have been printed in HTML, this could be accidental and this would be a good thing to keep track of. This is therefore a very powerful tool for website owners that need to monitor the security of their website and wish to have a free and easy way to scan a site for vulnerabilities that need to be patched. The alerts are rated by color, a red one is more severe than a yellow one, but you should endeavor to fix as many as possible. The reports may also be output in JSON format, this can be imported into another application for processing.

Of course, this can be used to find vulnerabilities in websites that a person wishes to attack, but a white hat hacker can use this in defense as well. Finding vulnerabilities in your site before the bad guys do is very important and should be done promptly. As well as acting on problems found on your site.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.