Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Zed Attack Proxy Cookbook

You're reading from   Zed Attack Proxy Cookbook Hacking tactics, techniques, and procedures for testing web applications and APIs

Arrow left icon
Product type Paperback
Published in Mar 2023
Publisher Packt
ISBN-13 9781801817332
Length 284 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (3):
Arrow left icon
Nestor Torres Nestor Torres
Author Profile Icon Nestor Torres
Nestor Torres
Ahmed Almoailu Ahmed Almoailu
Author Profile Icon Ahmed Almoailu
Ahmed Almoailu
Ryan Soper Ryan Soper
Author Profile Icon Ryan Soper
Ryan Soper
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Chapter 1: Getting Started with OWASP Zed Attack Proxy 2. Chapter 2: Navigating the UI FREE CHAPTER 3. Chapter 3: Configuring, Crawling, Scanning, and Reporting 4. Chapter 4: Authentication and Authorization Testing 5. Chapter 5: Testing of Session Management 6. Chapter 6: Validating (Data) Inputs – Part 1 7. Chapter 7: Validating (Data) Inputs – Part 2 8. Chapter 8: Business Logic Testing 9. Chapter 9: Client-Side Testing 10. Chapter 10: Advanced Attack Techniques 11. Chapter 11: Advanced Adventures with ZAP 12. Index 13. Other Books You May Enjoy

Encode/Decode/Hash dialog

In this recipe, we are going to go over how to perform encoding and decoding and hashing in ZAP Proxy.

Getting ready

For you to be able to go over this recipe, you will need to have ZAP installed on your computer and also have it started and running.

How to do it…

Encoding is the process of converting data from one form to another, whereas decoding is reversing this conversion. ZAP comes built with a feature to aid its users with a quick way to convert and divert data. In addition to this process, and contained within the same setting, is a feature that creates simple hashes of that data. To get started, select from the menu bar at the top tools, then a little over halfway down, select Encode/Decode/Hash.

Tip

For a shortcut hotkey, on a Windows system, press Ctrl + E. On a macOS system, press Command + E.

When the editor opens, the first thing to note is the input field, which you use to enter the text you wish to encode, decode, and hash, determine illegal UTF-8 bytes, or convert to Unicode. Once you enter the desired text, all the fields will automatically be converted for you.

Next, there is a toolbar that offers a few options. These are as follows:

  • Add new tab: Adds a new tab
  • Delete selected tab: Removes the currently selected tab
  • Add output panel: Adds an output panel to the current tab
  • Reset: Resets all the tabs to their default state
Figure 2.28 – The Encode/Decode/Hash dialog box

Figure 2.28 – The Encode/Decode/Hash dialog box

As indicated in the Script drop-down menu in the output panel in Figure 2.29, a user can add new fields for comparing data.

Figure 2.29 – The output panel

Figure 2.29 – The output panel

With your encoded or hashed script, we’ll move on to fuzzing and how to configure different options for optimizing your approach to web application penetration testing.

How it works…

Using this tool can quickly change operational use with wordlists used in fuzzing applications with attack vectors such as cross-site scripting, SQL injection, and so on. The ability to quickly get a list of different values can help in bypassing poorly implemented validation or encoding in web applications.

See also

For a tool with robust operations for encoding, decoding, and hashing strings, check out CyberChef: https://gchq.github.io/CyberChef/.

You have been reading a chapter from
Zed Attack Proxy Cookbook
Published in: Mar 2023
Publisher: Packt
ISBN-13: 9781801817332
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime