Thank you so much to the response!
Unfortunately, no dice. I have attached the screenshot that would illustrate it.
The screenshot has the full request payload sent by ZAP, along with the Active Scan dialog box, where I had defined the parameter to be ignored prior to executing the scan.
To recap
I am trying to do a scan of a SOAP web service. The user authentication is done via the header of my XML request, that contains a username and password parameters. The service will lock the user account out that sends the XML POST request after a few wrong passwords are used.
My intention is to exclude the password parameter from the scan, i.e. have ZAP ignore that parameter altogether.
The steps
1. Navigate in the POST SOAP request listed in the Sites tree on the left in ZAP
2. Right click on the request and select Attack>Active Scan
3. In the loaded Active Scan dialog navigate to the Input Vectors tab
4. In the Input Vectors tab click on the Add button at the bottom in order to add a parameter to be ignored by the scanner
5. Define a new parameter for exclusion: URL: *; Where: PostData; Name: wsse:Password
6. Press Start Scan button
7. Let the scan finish
8. Select Active Scan window to see the list of requests submitted by the scan
9. Go clicking on each request to observe the request's payload in the Request & Response pane above
EXPECTED RESULT: None of the requests has original password text altered.
ACTUAL RESULT: A few requests have the original password text replaced with the following injection string: &zapxxe;
The screenshot has all the details please.
Best regards!