December 2017
Intermediate to advanced
364 pages
7h 30m
English
The following playbook will run the full scan against the DVWS application. Now we can see that the playbook looks almost similar, except the flags sent to command:
- name: Running OWASP ZAP Full Scan hosts: zap remote_user: "{{ remote_user_name }}" gather_facts: no become: yes vars: remote_user_name: ubuntu owasp_zap_image_name: owasp/zap2docker-weekly website_url: {{ website_url }} reports_location: /zapdata/ scan_name: owasp-zap-full-scan-dvws tasks: - name: adding write permissions to reports directory file:
path: "{{ reports_location }}" state: directory owner: root group: root recurse: yes mode: 0777 - name: running owasp zap full scan container against "{{ website_url }}" docker_container: name