Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Posted on January 23, 2026January 23, 2026 By CWS

The Zed Assault Proxy (ZAP) staff has launched the OWASP PTK add-on, model 0.2.0 alpha, integrating the OWASP Penetration Testing Equipment (PTK) browser extension instantly into ZAP-launched browsers.

This streamlines utility safety testing by embedding DAST, IAST, SAST, SCA, and specialised instruments like JWT and cookie editors with out handbook setup. Out there through the ZAP Market, the add-on pre-installs PTK in Chrome, Edge, and Firefox periods proxied via ZAP.

Customers set up the OWASP PTK add-on from ZAP’s Market, then launch a supported browser through ZAP’s characteristic. The PTK icon seems instantly, permitting login to targets and initiation of scans. ZAP handles visitors seize, web site tree, historical past, and session administration, whereas PTK supplies browser-native testing instruments.

PTK’s DAST allows runtime scans throughout regular looking: begin scan, navigate key flows like kinds and admin pages, cease, and evaluate findings.

Very best for SPAs reliant on consumer interactions, it recommends tuning requests per second and concurrency for manufacturing stability, with tight area scoping to reduce noise. Findings combine with ZAP for re-testing through request instruments.

IAST screens browser runtime conduct, injecting brokers throughout scans for alerts past response evaluation. Begin monitoring, browse authenticated routes, then triage DOM mutations and client-side rendering points.

This excels in UI-state dependent apps, providing fast context for pen testers staying throughout the browser workflow.

SAST analyzes inline and exterior scripts loaded in manufacturing, recognizing sinks and patterns with out repo entry. Run on present pages, pivot findings to DAST/IAST for validation, particularly helpful for third-party scripts in SPAs. SCA reveals dependency dangers from working apps, reviewing packages with ZAP context for loading behaviors.

Request Builder facilitates speedy iteration: edit visitors from ZAP historical past, replay assaults, clone as cURL, or manipulate headers. JWT instruments decode tokens, alter claims/algorithms, and take a look at enforcement like exp or weak HMAC, replaying through ZAP for response diffs. Cookie instruments allow modifying, blocking, or exporting for session reproducibility.

A sensible routine begins with ZAP-proxied browser login, adopted by PTK DAST/IAST throughout flows, SAST/SCA for static alerts, and JWT/cookie validation.

This combo leverages ZAP because the proxy hub and PTK for focused browser testing, enhancing protection on trendy net apps. Emphasize permission-based lively scans and conservative settings.

The discharge, introduced January 19, 2026, marks a milestone in ZAP-PTK synergy, developed with contributions from Denis Podgurskii. Pen testers acquire environment friendly, context-aware testing for authenticated, dynamic functions.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Application, Browser, Extension, Kit, OWASP, Pentest, Releases, Security, Testing, ZAP

Post navigation

Previous Post: Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Next Post: New Windows 11 KB5074109 Update Breaks Systems

Related Posts

Hackers Reportedly Demand Google Fire Two Employees, Threaten Data Leak Hackers Reportedly Demand Google Fire Two Employees, Threaten Data Leak Cyber Security News
What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware Cyber Security News
CISA Retires Ten Emergency Directives Following Milestone Achievement CISA Retires Ten Emergency Directives Following Milestone Achievement Cyber Security News
New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems New Phishing Attack Impersonate as DocuSign Deploys Stealthy Malware on Windows Systems Cyber Security News
AppGuard Critiques AI Defenses & Expands Insider Release AppGuard Critiques AI Defenses & Expands Insider Release Cyber Security News
Hackers Leverage Multiple Ad Networks to Attack Adroid Users With Triada Malware Hackers Leverage Multiple Ad Networks to Attack Adroid Users With Triada Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News