Skip to content

Commit f479f95

Browse files
authored
Merge pull request #283 from OWASP/dast-tools
#282 General page on dast tools.
2 parents 475f244 + c482c04 commit f479f95

File tree

11 files changed

+82
-95
lines changed

11 files changed

+82
-95
lines changed

.wordlist.txt

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ CVE
55
CWE
66
Cavalcanti
77
Customizable
8+
dast
89
DockerHub
910
EscapeAll
1011
Flaxman

_data/draft.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,8 +163,8 @@ docs:
163163
- title: '6.2 Tools'
164164
url: verification/tools
165165

166-
- title: '6.2.1 Zed Attack Proxy'
167-
url: verification/tools/zed_attack_proxy
166+
- title: '6.2.1 DAST'
167+
url: verification/tools/dast
168168

169169
- title: '6.2.2 Amass'
170170
url: verification/tools/amass

draft/02-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ permalink:
7373
6.1.2 [MAS Testing Guide](#mas-testing-guide)
7474
6.1.3 [Application Security Verification Standard](#application-security-verification-standard)
7575
6.2 [Tools](#verification-tools)
76-
6.2.1 [Zed Attack Proxy](#zed-attack-proxy)
76+
6.2.1 [DAST](#dast)
7777
6.2.2 [Amass](#amass)
7878
6.2.3 [Offensive Web Testing Framework](#offensive-web-testing-framework)
7979
6.2.4 [Nettacker](#nettacker)

draft/04-foundations/02-secure-development.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,6 @@ There are many OWASP tools and resources to help build security into the SDLC.
165165
* [Nettacker][net]
166166
* [Offensive Web Testing Framework][owtf] (OWTF)
167167
* [Web Security Testing Guide][wstg] (WSTG)
168-
* [Zed Attack Proxy][zap] (ZAP)
169168

170169
#### OWASP training projects
171170

@@ -237,6 +236,5 @@ then [submit an issue][issue0402] or [edit on GitHub][edit0402].
237236
[intstand]: https://owasp.org/www-project-integration-standards/
238237
[webgoat]: https://owasp.org/www-project-webgoat/
239238
[wstg]: https://owasp.org/www-project-web-security-testing-guide/
240-
[zap]: https://www.zaproxy.org/
241239

242240
\newpage

draft/08-verification/00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Sections:
4444
6.1.2 [MAS Testing Guide](#mas-testing-guide)
4545
6.1.3 [Application Security Verification Standard](#application-security-verification-standard)
4646
6.2 [Tools](#verification-tools)
47-
6.2.1 [Zed Attack Proxy](#zed-attack-proxy)
47+
6.2.1 [DAST](#dast)
4848
6.2.2 [Amass](#amass)
4949
6.2.3 [Offensive Web Testing Framework](#offensive-web-testing-framework)
5050
6.2.4 [Nettacker](#nettacker)

draft/08-verification/02-tools/00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ whereas manual security testing of high-risk components requires good knowledge
2727

2828
Sections:
2929

30-
6.2.1 [Zed Attack Proxy](#zed-attack-proxy)
30+
6.2.1 [DAST](#dast)
3131
6.2.2 [Amass](#amass)
3232
6.2.3 [Offensive Web Testing Framework](#offensive-web-testing-framework)
3333
6.2.4 [Nettacker](#nettacker)
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
3+
title: DAST
4+
layout: col-document
5+
tags: OWASP Developer Guide
6+
contributors: Jon Gadsden, Johan Sydseter
7+
document: OWASP Developer Guide
8+
order: 821
9+
permalink: /draft/verification/tools/dast/
10+
11+
---
12+
13+
{% include breadcrumb.html %}
14+
15+
<style type="text/css">
16+
.image-right {
17+
height: 180px;
18+
display: block;
19+
margin-left: auto;
20+
margin-right: auto;
21+
float: right;
22+
}
23+
</style>
24+
25+
Dynamic application security testing (DAST) represents a non-functional testing process to identify security weaknesses and
26+
vulnerabilities in applications. The testing process can be carried out manually or be automated. Manual assessment of an
27+
application involves human intervention to identify security flaws which might slip from an automated tool. Usually
28+
business logic errors, race condition checks, and certain zero-day vulnerabilities can only be identified using manual
29+
assessments.
30+
31+
### 6.2.1 DAST tools
32+
33+
DAST tools are programs which communicates with a web application through the web front-end in order to identify potential
34+
security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike static
35+
application security testing tools, DAST tools do not have access to the source code and therefore detect vulnerabilities
36+
by actually performing attacks.
37+
38+
#### Different DAST tools
39+
40+
The OWASP Community projects contains a [list of DAST tools][dast] can be used to conduct DAST. All of these tools have
41+
their own strengths and weaknesses. If you are interested in the effectiveness of DAST tools, check out the
42+
[OWASP Benchmark][benchmark] project, which attempts to scientifically measure the effectiveness of all types of
43+
vulnerability detection tools, including DAST.
44+
45+
#### Why use it?
46+
47+
The big advantage of these types of tools are that they can scan year-round to be constantly searching for vulnerabilities.
48+
With new vulnerabilities being discovered regularly this allows companies to find and patch vulnerabilities before they
49+
can become exploited.
50+
51+
#### Cons
52+
53+
Because these tools does dynamic testing, it cannot cover 100% of the source code of the application and then, the
54+
application itself. The penetration tester should look at the coverage of the web application or of its attack surface to
55+
know if the tool was configured correctly or was able to understand the web application.
56+
57+
#### References
58+
59+
* [Dynamic application security testing][wikipedia]
60+
* [Vulnerability Scanning Tools][dast]
61+
62+
----
63+
64+
The OWASP Developer Guide is a community effort; if there is something that needs changing
65+
then [submit an issue][issue080201] or [edit on GitHub][edit080201].
66+
67+
[benchmark]: https://owasp.org/www-project-benchmark/
68+
[dast]: https://owasp.org/www-community/Vulnerability_Scanning_Tools
69+
[edit080201]: https://github.com/OWASP/www-project-developer-guide/blob/main/draft/08-verification/02-tools/01-dast.md
70+
[issue080201]: https://github.com/OWASP/www-project-developer-guide/issues/new?labels=content&template=request.md&title=Update:%2008-verification/02-tools/01-dast
71+
[wikipedia]: https://en.wikipedia.org/wiki/Dynamic_application_security_testing
72+
73+
\newpage

draft/08-verification/02-tools/01-zap.md

Lines changed: 0 additions & 85 deletions
This file was deleted.

draft/08-verification/02-tools/toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ whereas manual security testing of high-risk components requires good knowledge
3838

3939
Sections:
4040

41-
6.2.1 [Zed Attack Proxy](01-zap.md)
41+
6.2.1 [DAST](01-dast.md)
4242
6.2.2 [Amass](02-amass.md)
4343
6.2.3 [Offensive Web Testing Framework](03-owtf.md)
4444
6.2.4 [Nettacker](04-nettacker.md)

draft/08-verification/toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Sections:
5555
6.1.2 [MAS Testing Guide](01-guides/02-mastg.md)
5656
6.1.3 [Application Security Verification Standard](01-guides/03-asvs.md)
5757
6.2 [Tools](02-tools/toc.md)
58-
6.2.1 [Zed Attack Proxy](02-tools/01-zap.md)
58+
6.2.1 [DAST](02-tools/01-dast.md)
5959
6.2.2 [Amass](02-tools/02-amass.md)
6060
6.2.3 [Offensive Web Testing Framework](02-tools/03-owtf.md)
6161
6.2.4 [Nettacker](02-tools/04-nettacker.md)

draft/toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ This draft version has the latest contributions to the Developer Guide so expect
7979
6.1.2 [MAS Testing Guide](08-verification/01-guides/02-mastg.md)
8080
6.1.3 [Application Security Verification Standard](08-verification/01-guides/03-asvs.md)
8181
6.2 [Tools](08-verification/02-tools/toc.md)
82-
6.2.1 [Zed Attack Proxy](08-verification/02-tools/01-zap.md)
82+
6.2.1 [DAST](08-verification/02-tools/01-dast.md)
8383
6.2.2 [Amass](08-verification/02-tools/02-amass.md)
8484
6.2.3 [Offensive Web Testing Framework](08-verification/02-tools/03-owtf.md)
8585
6.2.4 [Nettacker](08-verification/02-tools/04-nettacker.md)

0 commit comments

Comments
 (0)