Hi Simon,Let me reframe my question as below:B) Second, we configured ZAP as a proxy for our browser and captured all the requests and then performed the attack on them.This generated a report with 12 critical issues.I remember you mentioned in the conference that baseline scan is just a basic scan and may not be in-depth.
And, from my understanding the REST API support does not have the option to setup ZAP as a proxy from the browser;giving the end user the freedom to explore the service and capture the requests. (basically a manual spider)
PS C:\Python27\Scripts> python .\activescan_zap_api_script.py
Traceback (most recent call last):
File ".\activescan_zap_api_script.py", line 5, in <module>
zap.ascan.scan('http://localhost:8080')
File "C:\Program Files\PYTHON27\lib\site-packages\zapv2\ascan.py", line 168, in scan
return next(self.zap._request(self.zap.base + 'ascan/action/scan/', params).itervalues())
File "C:\Program Files\PYTHON27\lib\site-packages\zapv2\__init__.py", line 145, in _request
return json.loads(self.urlopen(url + '?' + urllib.urlencode(get)))
File "C:\Program Files\PYTHON27\lib\json\__init__.py", line 339, in loads
return _default_decoder.decode(s)
File "C:\Program Files\PYTHON27\lib\json\decoder.py", line 364, in decode
obj, end = self.raw_decode(s, idx=_w(s, 0).end())
File "C:\Program Files\PYTHON27\lib\json\decoder.py", line 382, in raw_decode
raise ValueError("No JSON object could be decoded")
ValueError: No JSON object could be decoded
We use the ZAP docker images (https://github.com/zaproxy/zaproxy/wiki/Docker) which I think are really useful for automating ZAP:)
Cheers,
Simon