Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Posted on January 23, 2026January 23, 2026 By CWS

The Zed Assault Proxy (ZAP) staff has launched the OWASP PTK add-on, model 0.2.0 alpha, integrating the OWASP Penetration Testing Equipment (PTK) browser extension instantly into ZAP-launched browsers.

This streamlines utility safety testing by embedding DAST, IAST, SAST, SCA, and specialised instruments like JWT and cookie editors with out handbook setup. Out there through the ZAP Market, the add-on pre-installs PTK in Chrome, Edge, and Firefox periods proxied via ZAP.

Customers set up the OWASP PTK add-on from ZAP’s Market, then launch a supported browser through ZAP’s characteristic. The PTK icon seems instantly, permitting login to targets and initiation of scans. ZAP handles visitors seize, web site tree, historical past, and session administration, whereas PTK supplies browser-native testing instruments.

PTK’s DAST allows runtime scans throughout regular looking: begin scan, navigate key flows like kinds and admin pages, cease, and evaluate findings.

Very best for SPAs reliant on consumer interactions, it recommends tuning requests per second and concurrency for manufacturing stability, with tight area scoping to reduce noise. Findings combine with ZAP for re-testing through request instruments.

IAST screens browser runtime conduct, injecting brokers throughout scans for alerts past response evaluation. Begin monitoring, browse authenticated routes, then triage DOM mutations and client-side rendering points.

This excels in UI-state dependent apps, providing fast context for pen testers staying throughout the browser workflow.

SAST analyzes inline and exterior scripts loaded in manufacturing, recognizing sinks and patterns with out repo entry. Run on present pages, pivot findings to DAST/IAST for validation, particularly helpful for third-party scripts in SPAs. SCA reveals dependency dangers from working apps, reviewing packages with ZAP context for loading behaviors.

Request Builder facilitates speedy iteration: edit visitors from ZAP historical past, replay assaults, clone as cURL, or manipulate headers. JWT instruments decode tokens, alter claims/algorithms, and take a look at enforcement like exp or weak HMAC, replaying through ZAP for response diffs. Cookie instruments allow modifying, blocking, or exporting for session reproducibility.

A sensible routine begins with ZAP-proxied browser login, adopted by PTK DAST/IAST throughout flows, SAST/SCA for static alerts, and JWT/cookie validation.

This combo leverages ZAP because the proxy hub and PTK for focused browser testing, enhancing protection on trendy net apps. Emphasize permission-based lively scans and conservative settings.

The discharge, introduced January 19, 2026, marks a milestone in ZAP-PTK synergy, developed with contributions from Denis Podgurskii. Pen testers acquire environment friendly, context-aware testing for authenticated, dynamic functions.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Application, Browser, Extension, Kit, OWASP, Pentest, Releases, Security, Testing, ZAP

Post navigation

Previous Post: Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Next Post: New Windows 11 KB5074109 Update Breaks Systems

Related Posts

Chinese Hackers Actively Attacking Taiwan Critical Infrastructure Chinese Hackers Actively Attacking Taiwan Critical Infrastructure Cyber Security News
Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity Cyber Security News
Apache bRPC Vulnerability Enables Remote Command Injection Apache bRPC Vulnerability Enables Remote Command Injection Cyber Security News
New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules Cyber Security News
Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’ Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’ Cyber Security News
OpenClaw AI Platform Exploited to Spread Malware OpenClaw AI Platform Exploited to Spread Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News