Need help on analyzing the Fuzz results

332 views
Skip to first unread message

Jack.Sekar

unread,
Jun 4, 2015, 2:54:29 PM6/4/15
to zaprox...@googlegroups.com

Hi Group, I am new to Security testing and ZAP; for one of my task I am using this tool. Watched few video files on youtube and went through zap user group and found some details about what is fuzzing and fuzz results. One thing what I do not understand is, when I got the fuzz results a. Reflected and b. Successful

1. Should I need to manually verify the Reflected payload value against the text field (where i performed the fuzz) ?
(OR)
2. Should I need to verify successful payloads ?

From youtube: In some of the video files i see, after fuzzing user checks for only the reflected items and verify those agianst the text field.

Also, I've seen from the below post, saying Reflected does not mean that there is a vulnerability present. The user then has to determine manually if there is a vulnerability.
https://groups.google.com/forum/#!topic/zaproxy-users/lDOLVDAjqY8
 - How to determine.

Pls show me some light.. Thanks in advance..
Jack Sekar

Simon Bennetts

unread,
Jun 5, 2015, 3:50:58 AM6/5/15
to zaprox...@googlegroups.com, jack....@gmail.com
Hi Jack,

The active and passive scanners test for potential vulnerabilities where the code can determine if the issue is likely to be present.

Fuzzing is a manual technique.
You are using ZAP to send a set of payloads that you have specified, based on the type of vulnerability you are looking for.
ZAP provides info such as whether the payload was present in the response and the option to search for regexes.
However only you can determine if the attack you specified found the vulnerability you were looking for.
You can use fuzzing to detect all sorts of issues: XSS, SQL inject, access control vulnerabilities.
ZAP has no way of knowing what you are looking for or how to tell if it happened.

Does that make any more sense?

Simon

Jack.Sekar

unread,
Jun 6, 2015, 2:13:16 AM6/6/15
to zaprox...@googlegroups.com, jack....@gmail.com

Thank you Simon for clarifying my doubt :)
Reply all
Reply to author
Forward
0 new messages