Fuzzing is a technique of submitting lots of data to a target (often in the form of invalid or unexpected inputs).
ZAP allows you to fuzz any request using:
To access the Fuzzer dialog you can either:
Payload Generators generate the raw values or attacks that the fuzzer submits to the target application.
They are managed via the Payloads dialog.
Payload Processors can be used to change specific payloads before they are submitted.
They are managed via the Payload Processors dialog.
Fuzz Location Processors can be used to change all of the payloads before they are submitted.
They are managed via the Location Processors dialog.
Message Processors can access and change the messages being fuzzed, control the fuzzing process, and interact with the ZAP UI.
They are managed via the Fuzzer dialog ‘Message Processors’ tab.
Some of this functionality is based on code from the OWASP JBroFuzz project and includes files from the fuzzdb project.
Note that some fuzzdb files have been left out as they cause common anti-virus scanners to flag them as containing viruses.
You can replace them (and upgrade fuzzdb) by downloading the latest version of fuzzdb and expanding it in the ‘fuzzers’ library.
|Fuzzer options screen