FiddleZAP – A Simplified Version Of EKFiddle For OWASP ZAP

FiddleZAP is a simplified version of EKFiddle for OWASP ZAP.

With ZAP as your web proxy, you are able to flag malicious traffic based on predefined regular expressions.

Example: Alert, highlighting and tagging when a regex matches on a string within the HTML source code of a compromised website

AVvXsEgFm7cCjiXHIQtnWq5x94RlkfN 4kuSaaxs3hZuz5OEJfs7FRmieP1pM7Pve03gZsHyrGxKnFOtB9iNf1bgc7F54PLiYbDEfwHNJ33TCb8UTc87s4THIpIH1XoK3T0lc4 Hkl RV9UKX QsCMRszFntmaqlpnW6h6t2Gc3B19u3Xd90MCtw4k9LoOQ7qg=w640 h190

Installation

It should have the following structure: 

AVvXsEiFr4kotFvUXX3alq4iwyJOQBYNCpD1H4UZl14XJSCn9vWmCXMx91tZcgUrQe35N0RW9ibGJAVnXIPuxS07WWdvcvdAWG5Y64ziHzcxYyOi4tEfhc5fZEq IZRcTigEvfNb6JOWigFzPfBn5o7PCMYFaIiMl2JzxoAH839CYUZ 6BJr2KGuHpXH09ZcbQ=s16000

AVvXsEhiAuDHawsBhk3N7Qy au4EpCpPTVp6geg7trfgypRrPvYn JHmIywCC6uyAsZWmh7Mg99jMXvDgguP 8GNWNoiKp0V4vjiT lnE9VrWAF84j5nf0peYZdot1rlq hds5xmNGlf9isac hQY60LUcRK7xM6nd1h dBTMqYx D40 rC3fn7jkILUQIehA=s16000

There are 2 scripts (standalone, passive rules). The former is used to run manually on the currently loaded session (web traffic), the latter automatically runs while recording traffic.

Stand Alone

First, install the standalone script:

  • Click on the Load script icon:
AVvXsEjVnuCL8ttPI7UJn2FcpHorHoBlmiyi5CpNxaOjADlEq0nEnwDwm QU RxqCnhbGhTUsnP4nvEVLE1UMTkqte49JnbLgtS7Ze3uyZUhGvAAQzXcfRDHCPoQPcWF7TEQeO7GH2SGoTb MpqI4SppqkSn5Z4wc06IeFslSTJcL8ulaH pyULbi PZmEVCiQ=s16000

 

  • Select the following parameters:
AVvXsEgakNVulgI08cbyUyVKSttaX1BoLwapSptXjHr0cFZ4nCTnLKeU3tJqMZHTzbbDV3dB0CJZ8HZABCUEPNpUtDcZlInLwZXut9xUZVvzdLXW0sSPZSrxP0 9KhPekeJWMahFLuzNIljCdk9UkrydmXrq3GEgafERx

  • It now shows under standalone:
AVvXsEgobpKpCo3HXrqARU9pJ7AW x5Fy09yCiuhlw3FuCCNKMWMGvSYVjnsl 2ILfCbsDOwoWvirc1szLSzxAOLjrBpkTJIq2B dszykOA 2l8rJyhwnK34CgQnFC8skkcj7GG9BNfn0sMMUkWGwV9uGmZcKtvqtXh9 qNvrgl8IDP8j CXIyzG5aWkiiEIbQ

 

Passive Rules

Next, install the passive rules script:

  • Click on the Load script icon:
AVvXsEhOkqByMSJ5RXDyRpQiUHjSu2XEqXh9zWOb8hHYLy6v5en8Zfw 6pbiNA4c1ET777VQ968GdOtrEuB0yMUvAnxucu8n4bjeAOTsBZDHQW EHR72cJlTaBkXOgkx5y60rGtCif2X5mQslK 3qlnbqDvEmMqgWSGOz dVBoiLEOqbTsLZcGUWgEXjVVBMDA=s16000

  • Select the following parameters:
AVvXsEizf5ksWCYpFkRdQKpZ1EkRlCbXp37M2GonYrHJOVURApPD8GOkOCVircSVB ADIw9mcf8P3h7uCoPLvJ27OkK iFcjIQwM8jKM2nKhISGsSxSeApD 7U9nhijQT

The FiddleZAP script should now show up under Passive Rules. If it is not enabled, right-click on it and select Enable script.

AVvXsEhLuijd4MHBSW055PWkw0lky67lwRRHQ4tj829NDa10Yp7fRdDg5j3SMFCObVz RPUsF545W 7LegHnW1ELI6XYl3S qCRxaMudkFtOnogtLjGTDCRZUoby2wxb5f0ktl3ccMPwy1ke54e8aLkDYBPHKt v2v bpXgSm5aYagGY zAnaYPmHsvHyOlzg=s16000

 

Features

Regexes (rules) to detect malicious traffic

Rules for FiddleZAP can look for URI patterns and source code patterns (session body).

  • A community_rules.txt file is provided with some examples.

  • The user_rules.txt is your own rules file.

Rules are automatically loaded and used to scan incoming traffic (if Passive Rules script is enabled). If you want to run rules on previously captured traffic, you need to run the standalone script.

AVvXsEi4KvTgt9hwypzHd4 gZAStAEcv0Z2vYB5gHxUQxLKoo mke2rhRTOwnsQh tp7S6fvuStaZX294L bMLg0Vcr0fW6QZQxd jC m10Bohge0DIjnShYSvrpSYS CNR1a3gsd0YzyXoV5tT2UvWbmln7N1 w RJe7mcFCWoTlLGXMr nzMpRewrKwqerw=s16000

Color coding and tagging of matching web sessions

(This feature requires the neonmarker add-on)

AVvXsEif0IdsftzUJHY4p 6KP11qsGX0YQr60NK B9ZfV

Detailed alerts

AVvXsEjI1E3sCrLP7sFdBCVYhxA BLZns2hNly6HWL04ZvP1a50ry7IYJbZqkROJOBRfTdUUkG3vseBT xLOCjm6hdUiJlbh9pfYzY90btGTPxBXbBduWgHywH bMOJWZlpsTB1AUDm saRVDQCYQ7 8lqBVN3JN2BY40

click here to read full Article

Read More on Pentesting Tools

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: