Skip to content

Latest commit

 

History

History
83 lines (61 loc) · 1.66 KB

File metadata and controls

83 lines (61 loc) · 1.66 KB

HOWTO: Diagnostic Security Testing

Prerequisites

# Install dependencies
make install

# Start ZAP container
make docker-up

Step 1: Capture Traffic

Record a HAR file from your browser (F12 > Network > Export HAR) while browsing www.blahblah.com.

Save as: traffic.har

Step 2: Run Full Diagnostic Suite

# Run all diagnostic attacks in one command
python cli.py diagnose traffic.har --target https://www.blahblah.com -o ./results

This runs:

  • ZAP active scan (SQLi, XSS, etc.)
  • HTTP smuggling tests (CL.TE, TE.CL)
  • JWT vulnerability tests
  • CORS misconfiguration tests
  • Cache poisoning tests
  • Red team attacks (mass assignment, hidden params, race conditions)
  • Passive analysis (headers, PII, entropy)

Step 3: Individual Commands

ZAP Scan

python cli.py scan traffic.har --owasp --fail-fast --max-high 0

Advanced Attacks

python cli.py advanced traffic.har --all

IDOR Detection (requires 2 sessions)

python cli.py idor --session-a user1.har --session-b user2.har

GraphQL

python cli.py graphql traffic.har --introspection --batch-test

WebSocket

python cli.py websocket traffic.har --cswsh --fuzz

Step 4: Review Results

Reports generated in ./results/:

  • diagnostic_report.json - Full findings
  • diagnostic_report.html - Human-readable report
  • advanced_attacks.json - Advanced attack results
  • zap_alerts.json - ZAP findings

Web Interface

make run
# Open http://localhost:8501

CI/CD Integration

python cli.py diagnose traffic.har --fail-fast --max-high 0 --format sarif

Exit code 1 if critical vulnerabilities found.