You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 14, 2020. It is now read-only.
A set of examples can be found in the [examples](./examples) folder.
23
23
* Example *secureCodeBox.io*[scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
24
-
* Example *example.com*[scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
24
+
* Example *example.com*[scan](./examples/example.com/scan.yaml) and [findings](./examples/example.com/findings.yaml)
25
25
26
26
## Configuration
27
27
28
28
The follwing security scan configuration example are based on the [SSLyze Documentation], please take a look at the original documentation for more configuration examples.
29
29
30
30
The command line interface can be used to easily run server scans: `sslyze --regular www.example.com`
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.
11
+
12
+
To learn more about the ZAP scanner itself visit [OWASP_Zap_Project] or [zaproxy.org].
13
+
14
+
<!-- end -->
15
+
16
+
## Deployment
17
+
18
+
The ZAP scanType can be deployed via helm.
19
+
20
+
```bash
21
+
helm upgrade --install zap ./integrations/zap/
22
+
```
23
+
24
+
## Examples
25
+
26
+
A set of examples can be found in the [examples](./examples) folder.
27
+
* Example *secureCodeBox.io*[scan](./examples/secureCodeBox.io/scan.yaml) and [findings](./examples/secureCodeBox.io/findings.yaml)
28
+
* Example *example.com*[scan](./examples/example.com/scan.yaml) and [findings](./examples/example.com/findings.yaml)
29
+
30
+
## Configuration
31
+
32
+
The follwing security scan configuration example are based on the [ZAP Documentation], please take a look at the original documentation for more configuration examples.
33
+
34
+
The command line interface can be used to easily run server scans: `-t www.example.com`
35
+
36
+
```bash
37
+
Usage: zap-baseline.py -t <target> [options]
38
+
-t target target URL including the protocol, eg https://www.example.com
39
+
Options:
40
+
-h print this help message
41
+
-c config_file config file to use to INFO, IGNORE or FAIL warnings
42
+
-u config_url URL of config file to use to INFO, IGNORE or FAIL warnings
43
+
-g gen_file generate default config file (all rules set to WARN)
44
+
-m mins the number of minutes to spider for (default 1)
45
+
-r report_html file to write the full ZAP HTML report
46
+
-w report_md file to write the full ZAP Wiki (Markdown) report
47
+
-x report_xml file to write the full ZAP XML report
48
+
-J report_json file to write the full ZAP JSON document
49
+
-a include the alpha passive scan rules as well
50
+
-d show debug messages
51
+
-P specify listen port
52
+
-D delay in seconds to waitfor passive scanning
53
+
-i default rules not in the config file to INFO
54
+
-I do not return failure on warning
55
+
-j use the Ajax spider in addition to the traditional one
56
+
-l level minimum level to show: PASS, IGNORE, INFO, WARN or FAIL, use with -s to hide example URLs
57
+
-n context_file context file which will be loaded prior to spidering the target
58
+
-p progress_file progress file which specifies issues that are being addressed
59
+
-s short output format - dont show PASSes or example URLs
60
+
-T max timein minutes to waitfor ZAP to start and the passive scan to run
61
+
-z zap_options ZAP command line options e.g. -z "-config aaa=bbb -config ccc=ddd"
62
+
--hook path to python file that define your custom hooks
63
+
```
64
+
65
+
## Development
66
+
67
+
### Local setup
68
+
1. Clone the repository `git clone git@github.com:secureCodeBox/secureCodeBox-v2-alpha.git`
69
+
2. Ensure you have node.js installed
70
+
* On MacOs with brew package manager: `brew install node`
71
+
72
+
### Parser Development
73
+
74
+
1. Install the dependencies `npm install`
75
+
2. Update the parser function here: `./parser/parser.js`
76
+
3. Update the parser tests here: `./parser/parser.test.js`
0 commit comments