ZAP —- ZED ATTACK PROXY
It is an integrated pen-testing tool mostly useful for finding vulnerabilities in web applications. With the help of this tool we can intercept the request and responses, we can also even change the requests and responses by using break points.
In today’s lab we will be learning how to intercept the traffic of the victim’s Machines by using a proxy, to view all the requests and responses that which victim is expecting from the Real Server.
REQUIREMENTS:
Windows 7 as Target Machine (Virtual Machine)
Kali Linux as Attacker Machine
STEP 1:- First Fire up both Kali and Windows Operating Systems.
Step 2:- Now open The Windows 7 Machine then open Any browser here (Firefox), then go to options then search proxy, then open proxy settings, then