February 2019
Intermediate to advanced
256 pages
7h 34m
English
Once we have done the spider scan, the active scan will find the security vulnerabilities by sending malicious requests, such as XSS or SQL injection, based on the scanning policies.
Here is the command to trigger the active scan with CURL:
$ curl "http://localhost:8090/JSON/ascan/action/scan/?zapapiformat=JSON&formMethod=GET&url=http://hackazon.webscantest.com&recurse=&inScopeOnly=&scanPolicyName=&method=&postData=&contextId="
The URL of the active scan is http://localhost:8090/UI/ascan/action/scan/.
The key difference between the spider scan and the active scan is that the spider scan involves passive scanning, which entails monitoring security issues such as missing security headers, cross-site request ...
Read now
Unlock full access