USING A SECURITY ANALYSIS TOOL TO IDENTIFY CRITICAL VULNERABILITIES IN WEB APPLICATIONS

Authors

DOI:

https://doi.org/10.35546/kntu2078-4481.2025.4.3.7

Keywords:

OWASP ZAP, penetration testing, web applications, web security, proxy analysis, passive scanning, active scanning

Abstract

The article examines the features and practical applications of the OWASP Zed Attack Proxy tool in web application penetration testing, emphasizing the need to analyze its capabilities and role in modern approaches to information security assessment. The study investigates the principles of ZAP’s proxy mechanism, which allows the interception and analysis of HTTP(S) traffic and the construction of a site map based on observed requests and responses. Methods of passive scanning are analyzed, which enable security assessment without affecting server behavior, including the identification of missing or improperly configured HTTP headers, issues related to cookies, and other technical configuration shortcomings. The use of active scanning is also examined, involving controlled tests for common technical vulnerabilities, with an emphasis on performing such operations only in dedicated testing environments. Manual analysis tools are described, including the request editor, traffic history viewer, and basic fuzzing functionality, which allow researchers to evaluate application behavior under various input conditions. Additionally, the paper considers the possibilities of extending ZAP’s functionality through optional add-ons and using its API to automate routine tasks within predefined testing scenarios. The limitations of the tool are outlined, particularly the challenges of detecting complex logical vulnerabilities that require expert manual investigation. The findings indicate that OWASP ZAP is suitable for technical audits, initial security evaluations, and educational purposes, while highlighting the necessity of combining automated scanning with manual analysis when assessing complex web applications.

References

Горбаченко С., Бойко В. Тестування на проникнення як ефективний інструмент менеджменту кібербезпеки. Information Technology and Society. 2023. № 3 (9). С. 23–29. URL: https://doi.org/10.32689/maup.it.2023.3.3 (дата звернення: 14.11.2025).

Скибун О. Тестування на проникнення: мета та цілі. Grail of Science. 2022. № 22. С. 161–163. URL: https://doi.org/10.36074/grail-of-science.25.11.2022.28 (дата звернення: 17.11.2025).

Maniraj S. P., Ranganathan C. S., Sekar S. Securing Web Applications with OWASP ZAP for Comprehensive Security Testing. International Journal of Advances in Signal and Image Sciences. 2024. Vol. 10, no. 2. P. 12–23. URL: https://doi.org/10.29284/ijasis.10.2.2024.12-23 (date of access: 17.11.2025).

Reddy s. OWASP Top 10 for Layman: OWASP Top 10. Independently Published, 2019.

ZAP – Documentation. ZAP. URL: https://www.zaproxy.org/docs/(date of access: 17.11.2025).

OWASP Automated Threat Handbook: Web Applications / T. Zaw et al. Lulu Press, Inc., 2018.

Published

2025-12-31