Search

Traffic Interception using ZAP

ZAP —- ZED ATTACK PROXY

It is an integrated pen-testing tool mostly useful for finding vulnerabilities in web applications. With the help of this tool we can intercept the request and responses, we can also even change the requests and responses by using break points.

In today’s lab we will be learning how to intercept the traffic of the victim’s Machines by using a proxy, to view all the requests and responses that which victim is expecting from the Real Server.

REQUIREMENTS:

Windows 7 as Target Machine (Virtual Machine)

Kali Linux as Attacker Machine

STEP 1:- First Fire up both Kali and Windows Operating Systems.

Step 2:- Now open The Windows 7 Machine then open Any browser here (Firefox), then go to options then search proxy, then open proxy settings, then

Book A Free Demo Class

    Social Media
    Facebook
    Twitter
    WhatsApp
    LinkedIn