Fuzzing is a technique of submitting lots of invalid or unexpected data to a target.
ZAP allows you to fuzz any request still using:
To access the Fuzzer dialog you can either:
Payload Generators generate the raw attacks that the fuzzer submits to the target application.
They are managed via the Payloads dialog
Payload Processors can be used to change specific payloads before they are submitted.
They are managed via the Payload Processors dialog
Fuzz Location Processors can be used to change all of the payloads before they are submitted.
They are managed via the Location Processors dialog
Message Processors can access and change the messages being fuzzed, control the fuzzing process and interact with the ZAP UI.
They are managed via the Fuzzer dialog ‘Message Processors’ tab.
This functionality is based on code from the OWASP JBroFuzz project and includes files from the fuzzdb project.
Note that some fuzzdb files have been left out as they cause common anti virus scanners to flag them as containing viruses.
You can replace them (and upgrade fuzzdb) by downloading the latest version of fuzzdb and expanding it in the ‘fuzzers’ library.
|Fuzzer options screen|