Search

Traffic Interception using ZAP

ZAP —- ZED ATTACK PROXY

It is an integrated pen-testing tool mostly useful for finding vulnerabilities in web applications. With the help of this tool we can intercept the request and responses, we can also even change the requests and responses by using break points.

In today’s lab we will be learning how to intercept the traffic of the victim’s Machines by using a proxy, to view all the requests and responses that which victim is expecting from the Real Server.

REQUIREMENTS:

Windows 7 as Target Machine (Virtual Machine)

Kali Linux as Attacker Machine

STEP 1:- First Fire up both Kali and Windows Operating Systems.

Step 2:- Now open The Windows 7 Machine then open Any browser here (Firefox), then go to options then search proxy, then open proxy settings, then

Table of Contents

Social Media
Facebook
Twitter
WhatsApp
LinkedIn