Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Posted on January 23, 2026January 23, 2026 By CWS

The Zed Assault Proxy (ZAP) staff has launched the OWASP PTK add-on, model 0.2.0 alpha, integrating the OWASP Penetration Testing Equipment (PTK) browser extension instantly into ZAP-launched browsers.

This streamlines utility safety testing by embedding DAST, IAST, SAST, SCA, and specialised instruments like JWT and cookie editors with out handbook setup. Out there through the ZAP Market, the add-on pre-installs PTK in Chrome, Edge, and Firefox periods proxied via ZAP.

Customers set up the OWASP PTK add-on from ZAP’s Market, then launch a supported browser through ZAP’s characteristic. The PTK icon seems instantly, permitting login to targets and initiation of scans. ZAP handles visitors seize, web site tree, historical past, and session administration, whereas PTK supplies browser-native testing instruments.

PTK’s DAST allows runtime scans throughout regular looking: begin scan, navigate key flows like kinds and admin pages, cease, and evaluate findings.

Very best for SPAs reliant on consumer interactions, it recommends tuning requests per second and concurrency for manufacturing stability, with tight area scoping to reduce noise. Findings combine with ZAP for re-testing through request instruments.

IAST screens browser runtime conduct, injecting brokers throughout scans for alerts past response evaluation. Begin monitoring, browse authenticated routes, then triage DOM mutations and client-side rendering points.

This excels in UI-state dependent apps, providing fast context for pen testers staying throughout the browser workflow.

SAST analyzes inline and exterior scripts loaded in manufacturing, recognizing sinks and patterns with out repo entry. Run on present pages, pivot findings to DAST/IAST for validation, particularly helpful for third-party scripts in SPAs. SCA reveals dependency dangers from working apps, reviewing packages with ZAP context for loading behaviors.

Request Builder facilitates speedy iteration: edit visitors from ZAP historical past, replay assaults, clone as cURL, or manipulate headers. JWT instruments decode tokens, alter claims/algorithms, and take a look at enforcement like exp or weak HMAC, replaying through ZAP for response diffs. Cookie instruments allow modifying, blocking, or exporting for session reproducibility.

A sensible routine begins with ZAP-proxied browser login, adopted by PTK DAST/IAST throughout flows, SAST/SCA for static alerts, and JWT/cookie validation.

This combo leverages ZAP because the proxy hub and PTK for focused browser testing, enhancing protection on trendy net apps. Emphasize permission-based lively scans and conservative settings.

The discharge, introduced January 19, 2026, marks a milestone in ZAP-PTK synergy, developed with contributions from Denis Podgurskii. Pen testers acquire environment friendly, context-aware testing for authenticated, dynamic functions.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Application, Browser, Extension, Kit, OWASP, Pentest, Releases, Security, Testing, ZAP

Post navigation

Previous Post: Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Next Post: New Windows 11 KB5074109 Update Breaks Systems

Related Posts

NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data Cyber Security News
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks Cyber Security News
10 Best Cloud Monitoring Tools in 2025 Cyber Security News
New Phishing Attack Targets Facebook Users to Steal Login Credentials Cyber Security News
What’s Next for SOC in 2026: Get the Early-Adopter Advantage  Cyber Security News
Aembit Named to Rising in Cyber 2025 List of Top Cybersecurity Startups Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark