Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Posted on January 23, 2026January 23, 2026 By CWS

The Zed Assault Proxy (ZAP) staff has launched the OWASP PTK add-on, model 0.2.0 alpha, integrating the OWASP Penetration Testing Equipment (PTK) browser extension instantly into ZAP-launched browsers.

This streamlines utility safety testing by embedding DAST, IAST, SAST, SCA, and specialised instruments like JWT and cookie editors with out handbook setup. Out there through the ZAP Market, the add-on pre-installs PTK in Chrome, Edge, and Firefox periods proxied via ZAP.

Customers set up the OWASP PTK add-on from ZAP’s Market, then launch a supported browser through ZAP’s characteristic. The PTK icon seems instantly, permitting login to targets and initiation of scans. ZAP handles visitors seize, web site tree, historical past, and session administration, whereas PTK supplies browser-native testing instruments.

PTK’s DAST allows runtime scans throughout regular looking: begin scan, navigate key flows like kinds and admin pages, cease, and evaluate findings.

Very best for SPAs reliant on consumer interactions, it recommends tuning requests per second and concurrency for manufacturing stability, with tight area scoping to reduce noise. Findings combine with ZAP for re-testing through request instruments.

IAST screens browser runtime conduct, injecting brokers throughout scans for alerts past response evaluation. Begin monitoring, browse authenticated routes, then triage DOM mutations and client-side rendering points.

This excels in UI-state dependent apps, providing fast context for pen testers staying throughout the browser workflow.

SAST analyzes inline and exterior scripts loaded in manufacturing, recognizing sinks and patterns with out repo entry. Run on present pages, pivot findings to DAST/IAST for validation, particularly helpful for third-party scripts in SPAs. SCA reveals dependency dangers from working apps, reviewing packages with ZAP context for loading behaviors.

Request Builder facilitates speedy iteration: edit visitors from ZAP historical past, replay assaults, clone as cURL, or manipulate headers. JWT instruments decode tokens, alter claims/algorithms, and take a look at enforcement like exp or weak HMAC, replaying through ZAP for response diffs. Cookie instruments allow modifying, blocking, or exporting for session reproducibility.

A sensible routine begins with ZAP-proxied browser login, adopted by PTK DAST/IAST throughout flows, SAST/SCA for static alerts, and JWT/cookie validation.

This combo leverages ZAP because the proxy hub and PTK for focused browser testing, enhancing protection on trendy net apps. Emphasize permission-based lively scans and conservative settings.

The discharge, introduced January 19, 2026, marks a milestone in ZAP-PTK synergy, developed with contributions from Denis Podgurskii. Pen testers acquire environment friendly, context-aware testing for authenticated, dynamic functions.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Application, Browser, Extension, Kit, OWASP, Pentest, Releases, Security, Testing, ZAP

Post navigation

Previous Post: Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Next Post: New Windows 11 KB5074109 Update Breaks Systems

Related Posts

10 Best Security Service Edge (SSE) Solutions Cyber Security News
Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite Cyber Security News
New Cybercrime Tool ErrTraffic Let Attackers Automate ClickFix Attacks Cyber Security News
VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code Cyber Security News
10 Best Data Loss Prevention Software in 2025 Cyber Security News
Lessons Learned from Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026
  • New Windows Notepad and Paint Update Brings More Useful AI Features
  • Fresh SmarterMail Flaw Exploited for Admin Access
  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark